Authy logo
The easiest way to add Two-Factor Authentication to any website or app.
+ 1

What is Authy?

We make the best rated Two-Factor Authentication smartphone app for consumers, a Rest API for developers and a strong authentication platform for the enterprise.
Authy is a tool in the Security category of a tech stack.

Who uses Authy?

25 companies reportedly use Authy in their tech stacks, including Twitch, Coinbase, and DuckDuckGo.

55 developers on StackShare have stated that they use Authy.

Why developers like Authy?

Here’s a list of reasons why companies and developers use Authy
Top Reasons
Authy Reviews

Here are some stack decisions, common use cases and reviews by companies and developers who chose Authy in their tech stack.

Julien DeFrance
Julien DeFrance
Full Stack Engineering Manager at ValiMail · | 3 upvotes · 26K views
Twilio SendGrid
Twilio SendGrid
Twilio Functions
Twilio Functions

Nexmo vs Twilio ?

Back in the early days at SmartZip Analytics, that evaluation had - for whatever reason - been made by Product Management. Some developers might have been consulted, but we hadn't made the final call and some key engineering aspects of it were omitted.

When revamping the platform, I made sure to flip the decision process how it should be. Business provided an input but Engineering lead the way and has the final say on all implementation matters. My engineers and I decided on re-evaluating the criteria and vendor selection. Not only did we need SMS support, but were we not thinking about #VoiceAndSms support as the use cases evolved.

Also, on an engineering standpoint, SDK mattered. Nexmo didn't have any. Twilio did. No-one would ever want to re-build from scratch integration layers vendors should naturally come up with and provide their customers with.

Twilio won on all fronts. Including costs and implementation timelines. No-one even noticed the vendor switch.

Many years later, Twilio demonstrated its position as a leader by holding conferences in the Bay Area, announcing features like Twilio Functions. Even acquired Authy which we also used for 2FA. Twilio's growth has been amazing. Its recent acquisition of SendGrid continues to show it.

See more

Authy's Features

  • Very secure- We take security seriously. We use industry standard secure algorithms (HMAC RFC 4426) and 256 bits keys which are always encrypted at rest.
  • Fully redundant- The Authy API is deployed accross different PCI level 1 data-centers and it's fully redundant. We also use a DNS provider with anycast support. We've had 100% availability since 2011.
  • Great user experience- You connect to Authy using a transparent REST API which allows you to customize the experience you want for your users.
  • Fully mobile- We support any cellphone. We provide apps for all major phones (iPhone and Android) as well as text-messages for other cellphones.
  • No expensive &amp
  • complex setups- Hardware dongles, servers, software licenses, setup costs...It's 2013, forget all that. Authy is bringing two-factor authentication to the present.

Authy Alternatives & Comparisons

What are some alternatives to Authy?
Duo is a next-generation package manager that blends the best ideas from Component, Browserify and Go to make organizing and writing front-end code quick and painless.
Starling is a powerful but simple messaging server that enables reliable distributed queuing with an absolutely minimal overhead. It speaks the MemCache protocol for maximum cross-platform compatibility. Any language that speaks MemCache can take advantage of Starling's queue facilities.
It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.
Let's Encrypt
Let’s Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
The leading cybersecurity solution providing client-side protection against data loss, journey hijacking and intrusion while enhancing website performance. Assess and monitor privacy risk to protect against malicious JavaScript attacks.
See all alternatives

Authy's Stats

- No public GitHub repository available -

Authy's Followers
59 developers follow Authy to keep up with related blogs and decisions.
Visruth CV
Matt Shields
TED Vortex (Teodor Eugen Dutulescu)
Vinícius Novaes
Tyler M
Lasse Stilvang
James Scaur
Marius CC