Are you looking for technical integration materials?
If you're a developer, you can get started with Clef right now. See our integration guides, sample apps, and plugins on our developers page.
Confirmed data breaches involved leveraging weak or stolen passwords. Clef eliminates passwords entirely.
Users voluntarily opt-in to traditional two-factor authentication. Clef deployments see 10% adoption rates.
Network intrusions were carried out by compromised user accounts. Clef closes the loophole on user account security.
In losses from fraudulent purchases made online. Clef action authorization virtually eliminates fraud.
A review of commonly observed styles of hacks occurring across the business landscape and the vulnerabilities presented by traditional password based systems. Database breaches, phishing, and bucket brigade (aka man-in-the-middle) attacks, the most popular attack vectors, cannot compromise a Clef-protected account. See how Clef measures up against competing products on the market.
Security Architecture Overview
Clef replaces the traditional two factor authentication model with public key cryptography. We offer two different service architectures outside of our white label SDK for enterprise customers. Standard Authentication, which is optimized for ease of integration and relies on Clef as a central auditor of identity, and Distributed Authentication, which is optimized for high-security deployments and minimizes Clef's role as a trusted party.
We've built a replacement for usernames and passwords and the most secure two-factor authentication available. Clef basic is free and delivered via Clef's mobile app.
Clef replaces the traditional two-factor authentication model with RSA public-key cryptography. Our standard cryptographic login protects user accounts from a wide array of malicious attack vectors and a simple UI makes onboarding a breeze for almost everyone. Clef Basic is optimized for ease of integration and relies on Clef as a central auditor of identity.
Clef uses mobile RSA cryptography to authenticate identity and eliminate the need for usernames and passwords while boosting account security.
Simple set up
Clef basic can be added to your site in an afternoon. We've created step-by-step guides and have engineers that can assist with every integration.
We've built a number of plugins for popular platforms including WordPress, Joomla, and Magento. In just a few short steps you can get going with Clef today.
Companies that integrate Clef can get an extra layer of security to protect their customer accounts with integration of Clef Business.
Clef Business comes with Distributed Authentication. Clef authenticates identity, then your company sends your own challenge to the user’s phone. Distributed Authentication allows your site to verify the login independently, so that even in extreme cases of compromise, customer accounts are still protected. Clef Business is optimized for high-security deployments and minimizes Clef's role as auditor of trust.
Both Clef and your site verify each login independently, so user accounts are doubly protected from even the most sophisticated account attacks.
Control and customization
Clef Business allows our integration partners to have more control over user account management details and customize the Clef experience for their customers.
Allows our Business customers to trigger an authentication challenge for an action besides login that might be of particular high-security value to your business.
Clef Native is the true professional solution to eliminate user account fraud. Get all the benefits of Clef's mobile cryptography with Distributed Authentication and full customization to suit your business.
With Clef Native a fully branded solution is professionally integrated into your business application. Your customers experience your brand and benefit from increased network account security and a simple UI that improves customer delight and engagement. Clef Native is optimized for high-security high-volume enterprise deployments and white labels Clef's mobile cryptography for seamless integration into your company's app.
Customers engage with your brand experience backed by Clef's hefty security architecture and Clef gives you tools to customize user account security to suit your business.
Unlimited auth actions
With Clef Native, your price is locked in. So as your company grows, you never have to worry about variable future costs or additional fees. Clef scales with you.
Clef Native can be added to existing authentication protocols. Custom rules-based configuration allows you control over how Clef interacts with those systems.
Clef is more secure
Clef is based on public key cryptography, which protects against many more attacks than tokens or SMS. In particular, tokens and SMS are vulnerable to database breaches, phishing, and bucket brigade attacks that cannot compromise a Clef-protected account.
Clef gets better adoption
The only security that matters is the security you use. Clef’s user experience is passwordless and simple to use. It is adopted at a much higher rate than tokens or SMS. Traditional deployments see fewer than 1% of users opt-in, while Clef deployments typically see more than 10% of users opt-in.
Clef is priced for results
Delivering SMS is expensive. Even if users wanted to protect their accounts with SMS, it can be prohibitively expensive to send an SMS for every login happening on a site. Clef doesn’t have to rely on the telephone infrastructure, so we can service more logins at a lower price.
"With Clef, the often painful process of logging into a site feels, admittedly, a little bit magical." Nicole Perlroth, Cybersecurity & Privacy, NYTimes
"Clef isn’t just another nice feature, it is a critical part of our security." Ray Youseff, CEO, Paxful
"Clef's security to effort ratio is the best I've ever come across for logging in." Joey Krug, Lead Developer, Augur
"Our integration with Clef allows us to provide best in class security without compromising ease of use." Arthur Hayes, CEO, Bitmex