The client shares key personally identifiable data points to begin the authentication process
Client Authentication
![Phone showing a face scanning prompt](https://images.ctfassets.net/utbwtwojmk5p/157LzckTrikih30mdFRH02/574f2b27624997edc1bebb0cbd226c24/subproduct-account-auth-cover.png?w=860&fm=jpg&fl=progressive)
The problem
Our solution
Use cases
Prevent account takeover fraud
Frictionless fraud prevention
Check for known fraud hotspots
Periodic or event-based checks
Instant password recovery
Increased efficiency
Save up to 80% on costs
Password recovery and rebinding in seconds
How does it work?
![phone showing face scanning procedure](https://images.ctfassets.net/utbwtwojmk5p/jY965xG9zBzOI8v4RPJeT/cbefbc3f653e5ed2c2fb60af453dfd33/subproduct-account-auth-accordion.png?w=860&fm=jpg&fl=progressive)