Human Verification
Deviceless MFA

Identity Challenge Card

Prevent Hacker Attacks

When Stryker's device-bound MFA went down during the Iranian Handala intrusion, recovery got slower, more expensive, and more dangerous. Deviceless MFA is the category built for the day traditional MFA fails.

  • 100% workforce coverage — every worker, every environment
  • 100% of the Time — works when devices, apps, and networks don't
  • Cost 75% less than current MFA — no hardware, no per-seat app licenses

Protecting the world's workforce since 1997 • Over 15 Million Licenses Sold

U.S. Air Force trusts Avatier Identity Challenge Card for deviceless MFA
U.S. Army trusts Avatier Identity Challenge Card for deviceless MFA
Bayer trusts Avatier Identity Challenge Card for deviceless authentication
BBC trusts Avatier Identity Challenge Card for deviceless MFA
Broward County trusts Avatier Identity Challenge Card for deviceless MFA
Build-A-Bear trusts Avatier Identity Challenge Card for deviceless authentication
The Cosmopolitan trusts Avatier Identity Challenge Card for deviceless MFA
DHL trusts Avatier Identity Challenge Card for deviceless MFA
Emerson trusts Avatier Identity Challenge Card for deviceless authentication
ESPN trusts Avatier Identity Challenge Card for deviceless MFA
Fox News trusts Avatier Identity Challenge Card for deviceless MFA
GSA trusts Avatier Identity Challenge Card for deviceless MFA
Humana trusts Avatier Identity Challenge Card for deviceless authentication
ING trusts Avatier Identity Challenge Card for deviceless MFA
Lockheed Martin trusts Avatier Identity Challenge Card for deviceless MFA
Marriott trusts Avatier Identity Challenge Card for deviceless MFA
MillerCoors trusts Avatier Identity Challenge Card for deviceless MFA
NASA trusts Avatier Identity Challenge Card for deviceless MFA
Nordstrom trusts Avatier Identity Challenge Card for deviceless MFA
Oscar Mayer trusts Avatier Identity Challenge Card for deviceless authentication
Pfizer trusts Avatier Identity Challenge Card for deviceless authentication
Rockwell Collins trusts Avatier Identity Challenge Card for deviceless MFA
SC Johnson trusts Avatier Identity Challenge Card for deviceless authentication
Sprint Canada trusts Avatier Identity Challenge Card for deviceless MFA
Starbucks trusts Avatier Identity Challenge Card for deviceless authentication
Steak 'n Shake trusts Avatier Identity Challenge Card for deviceless MFA
USA Today trusts Avatier Identity Challenge Card for deviceless MFA
Welch's trusts Avatier Identity Challenge Card for deviceless authentication
Vail Resorts trusts Avatier Identity Challenge Card for deviceless MFA
Visa trusts Avatier Identity Challenge Card for deviceless MFA
Volkswagen trusts Avatier Identity Challenge Card for deviceless MFA
Zep trusts Avatier Identity Challenge Card for deviceless MFA
U.S. Air Force trusts Avatier Identity Challenge Card for deviceless MFA
U.S. Army trusts Avatier Identity Challenge Card for deviceless MFA
Bayer trusts Avatier Identity Challenge Card for deviceless authentication
BBC trusts Avatier Identity Challenge Card for deviceless MFA
Broward County trusts Avatier Identity Challenge Card for deviceless MFA
Build-A-Bear trusts Avatier Identity Challenge Card for deviceless authentication
The Cosmopolitan trusts Avatier Identity Challenge Card for deviceless MFA
DHL trusts Avatier Identity Challenge Card for deviceless MFA
Emerson trusts Avatier Identity Challenge Card for deviceless authentication
ESPN trusts Avatier Identity Challenge Card for deviceless MFA
Fox News trusts Avatier Identity Challenge Card for deviceless MFA
GSA trusts Avatier Identity Challenge Card for deviceless MFA
Humana trusts Avatier Identity Challenge Card for deviceless authentication
ING trusts Avatier Identity Challenge Card for deviceless MFA
Lockheed Martin trusts Avatier Identity Challenge Card for deviceless MFA
Marriott trusts Avatier Identity Challenge Card for deviceless MFA
MillerCoors trusts Avatier Identity Challenge Card for deviceless MFA
NASA trusts Avatier Identity Challenge Card for deviceless MFA
Nordstrom trusts Avatier Identity Challenge Card for deviceless MFA
Oscar Mayer trusts Avatier Identity Challenge Card for deviceless authentication
Pfizer trusts Avatier Identity Challenge Card for deviceless authentication
Rockwell Collins trusts Avatier Identity Challenge Card for deviceless MFA
SC Johnson trusts Avatier Identity Challenge Card for deviceless authentication
Sprint Canada trusts Avatier Identity Challenge Card for deviceless MFA
Starbucks trusts Avatier Identity Challenge Card for deviceless authentication
Steak 'n Shake trusts Avatier Identity Challenge Card for deviceless MFA
USA Today trusts Avatier Identity Challenge Card for deviceless MFA
Welch's trusts Avatier Identity Challenge Card for deviceless authentication
Vail Resorts trusts Avatier Identity Challenge Card for deviceless MFA
Visa trusts Avatier Identity Challenge Card for deviceless MFA
Volkswagen trusts Avatier Identity Challenge Card for deviceless MFA
Zep trusts Avatier Identity Challenge Card for deviceless MFA
The Device Dependency Problem

Device-Dependent MFA Can't Protect Workers Who Don't Have a Device

Every MFA product on the market assumes a trusted device is available at authentication time. That assumption is wrong for most of the workforce.

80% of the global workforce is deskless. Factory floors, hospitals, field service, retail, logistics, education, construction — the workers running the operation rarely carry a work phone, and the ones who do can't use it on the shop floor.

The result is a documented coverage gap. Organizations write MFA exceptions for the workers they can't reach. Those exceptions are the attack surface cyber adversaries map first.1,2,3

SMS / voiceTOTP appsPush authenticatorsFIDO2 security keysHardware tokensBiometricsPasskeysSmartcardsNone are deviceless.

80 percent

80% of the global workforce is deskless

2.7 billion workers worldwide don't sit at a desk, don't carry a work phone, and can't install an authenticator app — and they're the workforce most organizations leave uncovered.

20 industries

Industries

5 to 88 percent

Device MFA reach

Retail
95% Deviceless coverage gap
5%
Healthcare
95% Deviceless coverage gap
5%
Transportation & Logistics
93% Deviceless coverage gap
7%
Manufacturing
92% Deviceless coverage gap
8%
Food & Beverage
90% Deviceless coverage gap
10% Device-covered workers
Construction
90% Deviceless coverage gap
10% Device-covered workers
Device-covered workers
Deviceless coverage gap

Deviceless MFA closes the red. Device-dependent MFA can't reach it without a phone, an app, a token, or a network.

For the CFO: every uncovered frontline worker is an uninsured breach vector — one stolen credential from a seven-figure incident, a denied cyber-policy claim, and an audit finding that pushes your next renewal. Deviceless MFA is how that math stops working against you.

Fifteen minutes. We'll map your coverage gap and what it's costing you today.

Sources

Fortune 500 workforce composition derived from 10-K filings, Bureau of Labor Statistics industry occupation mixes, and Gallup's State of the Global Workplace (2024). Deskless ratio per industry follows Emergence Capital's Deskless Workforce Report. Full methodology available on request.

  1. [1] Enterprise VC researchState of Technology for Deskless Workers (2020)
  2. [2] Global strategy consultancyMaking Work Work Better for Deskless Workers (Dec 2022)
  3. [3] Industry analyst firm75% of new mobile initiatives target frontline workers
  4. [4] Business publication2025 ranking of largest U.S. companies by revenue (June 2025)
Built for the Day Traditional MFA Fails

The Iranian Handala Stryker Attack Is Why Deviceless MFA Exists.

Handala is Iran-aligned. They don't want a ransom — they want you offline.

State-aligned wiper groups don't negotiate; they build payloads designed to keep your workforce locked out. Then the phone rings at your service desk. “This is John from Cardiology — I need my access back, now.” How does the tech on the line know it's actually John — and not the attacker who already owned John's phone?

The Difference

Device-Dependent MFA vs Deviceless Authentication

Device-Dependent MFA

Deviceless Authentication

Requires a phone, app, token, or hardware key
Works with a printed card — no device ever
Fails when devices, networks, or IdPs are down
Resolves locally during the outage
Push-bombing, SIM-swap, and replay are in-scope
One-time coordinates — replay is structurally impossible
Covers 20% of workforce; 80% is an exception list
Covers 100% of workers — every environment
Per-seat app licenses and hardware procurement
Printed once, reissued in seconds at cents per worker
Deployment measured in months per workforce segment
One IGA workflow — full deployment in one day

With this fallback identity layer, Stryker's rebuild would have been days, not weeks.

How It Works

Three Factors. Zero Device Dependency.

Deviceless MFA resolves three independent factors — all locally, all without a device, and all in under 10 seconds.

01

Challenge Card Factor

A printed grid of word pairs. At login, the system asks for a specific coordinate — the user reads the answer directly off the card. No network call. No device.

02

Private Knowledge Factor

A short PIN that only the user knows. Bound to the card via policy and verified in-memory so replay and brute-force have no surface.

03

Identity Anchor Factor

The user's directory identity — Employee ID, badge, or SCIM-provisioned principal. Ties the challenge to a specific human, with full audit trail.

See Deviceless Authentication

See Deviceless Authentication. Try It. Understand It in 60 Seconds.

Featured Demo

Self Enrollment or Auto Enroll Everyone at Once.

A narrated walkthrough of Deviceless MFA, the card, and how the three factors resolve locally.

1/6
Try Deviceless MFA Live

This is Deviceless MFA. Try it.

No signup. No download. Resolve a live three-factor challenge against a printed card, right here — same flow a worker runs during an identity outage.

No phone required

No app required

No network required

No hardware token required

No dependency on compromised systems

Works in any language, including RTL and CJK

Identity Challenge CardCard ID: B7eCB15
#ABCDE
1
INSTALL
POWDER
GARDEN
BRIDGE
MARBLE
SILVER
ROCKET
WINDOW
GUITAR
CASTLE
2
PLANET
ANCHOR
TURTLE
FOREST
BASKET
TEMPLE
VELVET
PIRATE
COTTON
DRAGON
3
CANYON
MAGNET
PUZZLE
ORANGE
VIOLET
BEACON
COPPER
JUNGLE
CARPET
MONKEY
4
HARBOR
KNIGHT
VISION
QUARTZ
JASPER
WILLOW
SUMMIT
STREAM
PARROT
FABRIC
5
MEADOW
COBALT
FABRIC
SPHINX
FALCON
BINARY
ORCHID
PRISM
LANTERN
OXYGEN
Three-Factor Challenge
Challenge Card Factor

Coordinate C2 TOP word

Private Knowledge Factor

Your PIN 1234

Identity Anchor Factor

Employee ID EMP-48291

How Three-Factor Works

· Challenge Card Factor — Find the coordinate (e.g., A1, B3) and enter the TOP or BOTTOM word

· Private Knowledge Factor — Read your 4-digit PIN, then enter it in the PIN field

· Identity Anchor Factor — Your Employee ID is verified automatically

· All three factors required — the word and PIN must both be correct to gain access

· New challenge — Tap 'New Game' to randomize a fresh coordinate and PIN

Outcomes by Role

The Business Value of Deviceless MFA Mapped to Who's Buying

Every stakeholder wins a different outcome. The Identity Challenge Card is the rare control where the CISO, CIO, CFO, CEO, service desk, and industry analyst each get their own answer.

Ready to close your compliance gaps with Deviceless MFA?

Book a 20-minute walkthrough tailored to your workforce — we'll map your exceptions to a deployment plan before you leave the call.

Book Meeting
Multilingual & Global

Built for Global Workforces

The Identity Challenge Card ships in 29 languages, including RTL Arabic and Hebrew and CJK Chinese, Japanese, and Korean. Same card, same three-factor flow — localized for every worker.

Compliance-Ready Deviceless MFA

Deviceless MFA, Trusted in Regulated Environments

Designed from day one for CMMC, HIPAA, PCI-DSS, GDPR, and FERPA workloads. Three architectural pillars make the compliance story simpler than device-bound MFA, not harder.

Privacy by Architecture

Zero personal data on the auth mechanism

  • No phone number, biometric, or personal data touches the card
  • Card contents are opaque without the user's PIN
  • Zero GDPR exposure from the authentication channel
  • No third-party processor between the user and the challenge
  • Revocation is immediate — no upstream device cleanup

Full Lifecycle Controls

Governed issuance, revocation, and audit

  • Every card is issued through the existing IGA workflow
  • Every challenge and re-issue writes an immutable audit record
  • Policy-enforced expiration and re-enrollment windows
  • Identity-verified re-issuance closes the social-engineering path
  • Separation of duties between issuer, approver, and auditor

Phishing-Resistant by Design

No push, no replay, no relay

  • No push notifications — push fatigue has no surface
  • Each coordinate value is one-time — replay is structurally impossible
  • Air-gapped verification — no network attack surface
  • No TOTP shared secret to exfiltrate
  • FIDO2-equivalent phishing resistance without a device

Recognized on Gartner Peer Insights

4.4

Based on 14 verified reviews of AvatierIdentity Governance and Administration

Read the reviews on Gartner Peer Insights
Deviceless MFA white paper — executive edition
Deviceless MFA enhanced product sheet
Original Identity Challenge Card product sheet
Executive Briefing

Download White Paper + Product Sheets

The full category argument, the Stryker recovery narrative, and the product sheet — three PDFs for the CISO, CIO, and board packet.

Deviceless MFA FAQs

Frequently Asked Questions

The same questions come up in every CISO, CIO, CFO, CEO, service desk, and analyst call. Answers below — pick your persona.

Phishing-resistant MFA for 100% of the workforce

What exactly is Deviceless MFA — and how is the Identity Challenge Card different from every other MFA?

Deviceless MFA is multi-factor authentication that works without a phone, an app, a hardware token, or a network connection. The Identity Challenge Card is the first production implementation: a printed grid of word pairs that a user looks up during login. When Stryker's device-bound MFA went down during the Iranian Handala intrusion, Deviceless MFA is the category that would have kept workforce verification running — one day to deploy, every worker covered, zero device dependency.

Is a printed card actually secure? A lost card means a compromised credential.

The card contains no personal data and no identity information. Without the PIN it is useless. A lost card is less dangerous than a lost phone — you can't SIM-swap paper. The card is revoked in seconds and replaced the same day. Cyber attackers cannot compromise paper. That is an architectural truth, not a tagline.

We already have MFA. Why does our existing solution leave a documented gap?

Authentication that works for 20% of your workforce does not protect your organization — it creates a documented 80% vulnerability. Every MFA exception you've written is a gap an attacker can map. Device-dependent MFA assumes devices, networks, and identity systems are available. During the Stryker attack, none of those assumptions held. Deviceless MFA is how you stop documenting 80% exceptions and start documenting 100% coverage.

Can push bombing or replay attacks work against this?

No. There are no push notifications — so push fatigue attacks have no surface. Each coordinate value is one-time — used values are permanently burned and never reused. Replay attacks are structurally impossible. Air-gapped Deviceless MFA means no network attack surface exists.

See Where Deviceless MFA Fits in Your Environment

No commitment · 30-min Deviceless MFA walkthrough · same-day response

Talk to the team behind the Identity Challenge Card — the first production Deviceless MFA.