Compare tru.ID to hardware security

One popular 2FA/MFA authentication method is hardware security — keys, tokens or dongles — that generate time-limited codes and must be carried.

We compare tru.ID SIM-based verification to hardware security, so you can make an informed decision about the solution that’s right for your business.

Hardware security keys

tru.ID

Security factor

authenticator apps
Hardware keys provide a
possession factor
and are harder to steal, but require the user to carry an extra piece of tech.
tru.ID
tru.ID is a stronger
possession factor
that uses the mobile phone to prove possession of a SIM card paired with the expected number.

Identity credential

authenticator apps
None or custom
tru.ID
Mobile phone number

Risk of compromise

authenticator apps
Medium
tru.ID
Low

User effort required

authenticator apps
High
tru.ID
Minimal

Data Collected

authenticator apps
None
tru.ID
None

Susceptible to Man-in-the-middle attacks?

authenticator apps
Yes
tru.ID
No

Susceptible to SIM swaps?

authenticator apps
No
tru.ID
No

Adding tru.ID is easy

Discover why forward-thinking companies are upgrading to silent SIM-based authentication.