Skip to content

Challenge Overview

Challenge Overview

Challenge provides identity verification workflows to help you detect and defend against impersonation and deepfake attacks.

What is Challenge?

Challenge helps organizations protect against impersonation and account-takeover attacks through identity verification workflows. Users can be challenged via Slack slash commands, webhook API, or IdP SSO integrations to verify their identity before accessing sensitive systems or processing high-risk requests.

Key Features

  • Slack Integration: Use /challenge slash command to request identity verification
  • Webhook API: Create challenges programmatically from ITSM systems or SOAR playbooks
  • IdP SSO: SAML 2.0 and OIDC authentication for identity verification
  • Device Fingerprinting: Collects browser, OS, IP address, and other security metadata
  • ITSM Integration: Seamlessly integrate into existing workflow systems
  • Account Takeover Prevention: Detect and prevent impersonation attacks
  • Deepfake Detection: Use device fingerprinting and authentication to identify potential threats

Getting Started

Check out our Challenge guides to set up your first verification workflow: