Skip to content

Continuous Multifactor Authentication

No phone, hard token, or webcam required.

Twosense continually monitors biometric behavior to provide zero-interruption MFA and take action any time the wrong user is behind the keyboard.


Easily Add Behavioral MFA to your Login Workflows

Twosense allows you to easily add continuous MFA to your login workflows, with no additional training or hardware required for your users.  Users don't need to manually enroll, sign up, or engage with Twosense to get started.


Human Error in MFA Can be Catastrophic

Multifactor Authentication is Useless if a User Accidentally Grants an Attacker Access

Some users accept malicious MFA requests out of habit. Attackers have persistently annoyed users into granting access. A user's phone can be stolen and used to authorize access to privileged information.

Take the user out of the loop with behavioral biometric MFA.


Time is Money

With every MFA challenge taking at least 15 seconds, interrupting your employees can cost your organization.

NIST-standard 15 minute session timeouts can mean near-constant multi-factor challenges. Frequent interruptions mean lower employee performance. Each MFA challenge takes at least 15 seconds, which add up throughout the day. These delays are both expensive and increase customer wait times.

PCI Compliance can be almost impossible to achieve in secure contact centers.

Because customer PII is viewable by call center agents, PCI Compliance requires multifactor authentication. NIST standards also call for 15 minute timeouts, which interrupt employees too frequently to be practical.

Twosense is 100% software and can be easily deployed onto any Windows workstations or VDI infrastructure.


066 Security

No Phone Required

Mobile phones are not allowed in secure contact centers, which rules out most traditional MFA.

No Hard Tokens Required

Employee turnover makes the deployment and retrieval of hard tokens impractical and costly.

No Webcam Required

Webcams are either not allowed or not included in the hardware most contact centers use.


"MFA is something everyone loves to hate, but it’s necessary and people get it,” he said. “With Twosense we are able to make that necessary evil a little less evil.”

- Taylor Higley, Director of Information Services, American Federation of Government Employees

Screen Shot 2022-06-10 at 12.14.39 PM

Machine Learning

The Twosense agent collects keystroke timing and mouse movements to build a model of each user's behavior.  Their most recent behavior is checked against the model to check their identity.

Additional Resources

June 28, 2022

How Does Continuous Multi-Factor Authentication Work?

The principles of MFA are actually quite simple. In order to gain access to a network, an application, or a VPN, you...
June 23, 2022

Continuous Multi-Factor Authentication: The Future of MFA

Most people are familiar with the term multi-factor authentication, whether it be from setting up a social media...
June 15, 2022

If Audited Today, Would Your Security Measure Up To PCI DSS Requirements? 

Necessary Evil Maintaining cardholder data security is one of the top priorities in a call center environment. It is...