Grant La Count

Keyri Now Integrates With Ping Identity’s DaVinci to Deliver a Unique Passwordless Customer Authentication Experience

Keyri = Ping Identity Integration

Keyri, the QR code-based passwordless authentication provider, announced a new integration with Ping Identity (NYSE: PING), the intelligent identity solution for the enterprise, leveraging PingOne DaVinci, a no-code identity orchestration service. The partnership will allow Ping Identity customers to transform their login experience into a one-step biometrics-based process, enabling a seamless user experience while strengthening account security.

Read More »

Introducing Keyri Self-Service

Keyri Self Serve Platform Announcement

Today, we are excited to publicly announce the self-serve version of our QR authentication product. With this launch, developers behind companies of all sizes and backgrounds can now use the Keyri system to add a simple and secure form of passwordless authentication to their sign up, login, and transaction verification flows.

This marks a major milestone in our mission to reshape the customer journey for a digital first economy.

Keyri is an authentication company, providing customers with a simple and secure form of passwordless MFA via QR authentication.

Read More »

The Problem With Selling a “Security” Product

No one cares! That’s not true, but essentially no one cares. Bringing up user security in an organization is like walking into a sports bar and talking about statistics. It matters, probably far more than the basic arguments being made in the bar, but does anyone in that bar really want to hear about stats? No. There are, however, large analytics departments in sports just as there are large security departments in companies. I suppose you could sell a security product to a security team, but if your product touches other departments like ours does, they certainly won’t care.

Read More »

Keyri is Now SOC 2 Compliant

After quite a bit of hard work, Keyri is now SOC 2 compliant. Some might ask, why would an early stage company go through this process? The answer is simple in our minds. We are, first and foremost, a security company and feel adhering to the most stringent security standards is important for our customers, so it’s imperative that we adhere to those ourselves as well.

What is SOC 2 Compliance?

SOC 2 specifies how organizations should manage customer data. The standard is based on the following Trust Services Criteria: security, availability, processing integrity, confidentiality, privacy.

Read More »

Desktop Login – Can You Make It Any Worse?

Last week I tried to make a wire transfer. Simple enough, should have taken me two minutes. Needless to say, it didn’t. First, I pulled out my phone and logged into my banking app. It was easy – I entered my username and password once a few years ago and now I login by leveraging FaceID. It takes <1 second. I love it. Unfortunately, my bank’s mobile app doesn’t have great wire transfer functionality so I grabbed my computer to log in on desktop.

Read More »

We’re Here to Fix Your Login Experience

As first time founders, we’ve been heads down in product and development work and have unfortunately neglected our blog until now. It’s finally time for our first post!

We’ve learned a lot over the last year, from starting out with an authenticator app, to focusing on mobile SDKs, going through Y Combinator, and raising a seed round. We’ll do a separate blog post on our learnings, but we thought it would be helpful to first explain why we built Keyri, why we exist, and what we’re solving.

Read More »