
Biometric MFA to Increase Security & Empower Users
Eliminate passwords with easy-to-use, multimodal biometric authentication for all your identity and access use cases.
BioThenticate® MFA is the ultimate gatekeeper for your network.
With state-of-the-art biometric authentication, BioThenticate eliminates the common causes of network breaches, including:
- Easy-to-guess passwords
- Infrequent password changes and poor hygiene
- Intentional password sharing
- Workforce expansion or contraction
- Phishing scams
- Brute-force attacks
With BioThenticate®, login is a brand new experience.
No having to remember password credentials. No push notifications. Greatly reduced support costs for your organization. With continuous validation happening in the background, your workforce operates in a state of almost real-time authorization.

Customized biometric factors
Choose from a number of identity factors based on your desired level of security.
Immediate Notifications
Administrators are notified and equipped to take action within seconds of a failed verification or recognition of irregular login patterns.
Super-fast login
Users can authenticate in seconds.
One-time user setup
Safe and private storage of biometric factors means users go through the setup process one time only.
Multimodal Biometric Authentication
BioThenticate provides six different biometric factors for customers to select from for their various use cases and user groups. SOFTwarfare works with your team to set the right factors and levels of authentication that are right for your organization.

Fingerprint
Captured fingerprint images are formatted for analysis and then mapped and transformed into a numerical model storing each fingerprint’s unique characteristics.

Face
The captured image is used to build a digital model of the user’s face in two dimensions, focusing on five unique measurements between facial features.

Voice
Audio recordings of a voice sample are analyzed by applying binary classification to spectrogram data, creating a matrix of distinct mathematical values mapped to the audio sample.

Iris
Invisible infrared light captures high-resolution images of the iris, then our algorithm uses these images to superimpose a set of polar coordinates to the resulting image.

Retina
An image of the unique blood vessels in the user’s eye is created by casting an unperceived beam of low-energy infrared light into the user’s eye, capturing the image of the contrast between the blood vessels.

Hand Geometry
An image of the hand is mathematically mapped, setting the relationships between different features of the user's palm and fingers, comparing size, deviation and angle against stored values.