Authy logo


The easiest way to add Two-Factor Authentication to any website or app.
+ 1

What is Authy?

We make the best rated Two-Factor Authentication smartphone app for consumers, a Rest API for developers and a strong authentication platform for the enterprise.
Authy is a tool in the Security category of a tech stack.

Who uses Authy?

29 companies reportedly use Authy in their tech stacks, including Twitch, Coinbase, and DuckDuckGo.

80 developers on StackShare have stated that they use Authy.

Why developers like Authy?

Here鈥檚 a list of reasons why companies and developers use Authy
Top Reasons
Authy Reviews

Here are some stack decisions, common use cases and reviews by companies and developers who chose Authy in their tech stack.

Julien DeFrance
Julien DeFrance
Principal Software Engineer at Tophatter | 3 upvotes 89.3K views
Twilio Functions
Twilio Functions
Twilio SendGrid
Twilio SendGrid

Nexmo vs Twilio ?

Back in the early days at SmartZip Analytics, that evaluation had - for whatever reason - been made by Product Management. Some developers might have been consulted, but we hadn't made the final call and some key engineering aspects of it were omitted.

When revamping the platform, I made sure to flip the decision process how it should be. Business provided an input but Engineering lead the way and has the final say on all implementation matters. My engineers and I decided on re-evaluating the criteria and vendor selection. Not only did we need SMS support, but were we not thinking about #VoiceAndSms support as the use cases evolved.

Also, on an engineering standpoint, SDK mattered. Nexmo didn't have any. Twilio did. No-one would ever want to re-build from scratch integration layers vendors should naturally come up with and provide their customers with.

Twilio won on all fronts. Including costs and implementation timelines. No-one even noticed the vendor switch.

Many years later, Twilio demonstrated its position as a leader by holding conferences in the Bay Area, announcing features like Twilio Functions. Even acquired Authy which we also used for 2FA. Twilio's growth has been amazing. Its recent acquisition of SendGrid continues to show it.

See more

Authy's Features

  • Very secure- We take security seriously. We use industry standard secure algorithms (HMAC RFC 4426) and 256 bits keys which are always encrypted at rest.
  • Fully redundant- The Authy API is deployed accross different PCI level 1 data-centers and it's fully redundant. We also use a DNS provider with anycast support. We've had 100% availability since 2011.
  • Great user experience- You connect to Authy using a transparent REST API which allows you to customize the experience you want for your users.
  • Fully mobile- We support any cellphone. We provide apps for all major phones (iPhone and Android) as well as text-messages for other cellphones.
  • No expensive &amp
  • complex setups- Hardware dongles, servers, software licenses, setup costs...It's 2013, forget all that. Authy is bringing two-factor authentication to the present.

Authy Alternatives & Comparisons

What are some alternatives to Authy?
Duo is a next-generation package manager that blends the best ideas from Component, Browserify and Go to make organizing and writing front-end code quick and painless.
Starling is a powerful but simple messaging server that enables reliable distributed queuing with an absolutely minimal overhead. It speaks the MemCache protocol for maximum cross-platform compatibility. Any language that speaks MemCache can take advantage of Starling's queue facilities.
Duo Security
In order to trust that your users are who they say they are, we verify their identity with an easy-to-use two-factor authentication solution, while giving you the ability to enforce stronger user access policies.
It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.
Let's Encrypt
It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
See all alternatives

Authy's Followers
84 developers follow Authy to keep up with related blogs and decisions.
Masanori Kawaguchi
Florent BIGOT
Bj枚rn A
Asiri Wijayasinghe
Will Furphy
Tomas Echeverri Valencia
鐓ф旦 璨寸敯
Adam Hedley
Jason Waldrip