Identity
Challenge Card
Iranian Stryker attack exposes device-dependent MFA vulnerability. Deviceless MFA authentication closes every exception. It verifies the human not the device.
- 100% workforce coverage
- 100% of the Time
- Cost 75% less than current MFA
| # | A | B | C | D | E |
|---|---|---|---|---|---|
| 1 | INSTALL POWDER | GARDEN BRIDGE | MARBLE SILVER | ROCKET WINDOW | GUITAR CASTLE |
| 2 | PLANET ANCHOR | TURTLE FOREST | BASKET TEMPLE | VELVET PIRATE | COTTON DRAGON |
| 3 | CANYON MAGNET | PUZZLE ORANGE | VIOLET BEACON | COPPER JUNGLE | CARPET MONKEY |
| 4 | HARBOR KNIGHT | VISION QUARTZ | JASPER WILLOW | SUMMIT STREAM | PARROT FABRIC |
| 5 | MEADOW COBALT | FABRIC SPHINX | FALCON BINARY | ORCHID PRISM | LANTERN OXYGEN |
Protecting the world's workforce since 1997
































































Device-Dependent MFA
Can't Protect Workers
Who Don't Have a Device
Device-dependent MFA has a compliance gap — and a hidden price tag.
It assumes every worker carries a managed device. Frontline staff, contractors, and shared-workstation employees usually don't — so they sit outside your MFA perimeter, outside your compliance posture, and squarely in your auditor's next finding. For the workforce you do cover, you're paying a quiet tax: MDM licenses, help-desk tickets, and an endless re-enrollment treadmill every time an employee swaps phones.
Deviceless MFA closes the gap without the overhead. End users self-enroll with nothing but a password — or IT mass-enrolls thousands in a single workflow. No devices to provision. No MDM to manage. No re-enrollment cycle. Just coverage.1,2,3
0%
of the global workforce is deskless
No device. No enrollment. No Conditional Access signal. Device-bound MFA can't reach them. Deviceless MFA can.
0
Industries
0–0%
Device MFA reach
The Identity Challenge Card. The first truly deviceless MFA.
A physical, air-gapped authenticator — no phone, no laptop, no app, no network. The card is the factor. That's what makes it deviceless, and that's what makes it the only MFA that covers 100% of your workforce — including the 70–95% your MDM was never going to reach.
For the CFO: every uncovered frontline worker is an uninsured breach vector — one stolen credential from a seven-figure incident, a denied cyber-policy claim, and an audit finding that pushes your next renewal. Deviceless MFA is how that math stops working against you.
Fifteen minutes. We'll map your coverage gap and what it's costing you today.
Sources
- [1] Enterprise VC research — State of Technology for Deskless Workers (2020)
- [2] Global strategy consultancy — Making Work Work Better for Deskless Workers (Dec 2022)
- [3] Industry analyst firm — 75% of new mobile initiatives target frontline workers
- [4] Business publication — 2025 ranking of largest U.S. companies by revenue (June 2025)
The Iranian Handala
Stryker Attack Is
Why Deviceless MFA Exists.
Handala is Iran-aligned. They don't want a ransom — they want you offline.
State-aligned wiper groups don't negotiate; they build payloads designed to keep your workforce locked out. Then the phone rings at your service desk. “This is John from Cardiology — I need my access back, now.” How does the tech on the line know it's actually John — and not the attacker who already owned John's phone? At Stryker, when device-bound MFA failed, there was no way to confirm who was on the other end of the call. Every unverifiable caller is a decision you can't safely make.
The Identity Challenge Card verifies the human, not the hardware. Three factors on one air-gapped credential: the card(can't be cloned remotely), a PIN (never stored on a device), and an identity factor(verified at the point of use). Traditional MFA only proves the attacker hasn't rooted the device holding your token — an assumption that collapses in an Iranian-playbook incident before the first alert fires.
Service desk and IT operations use ICC as their live identity check. The caller reads the challenge off their card and performs some Avatier magic request. Now IT operations know they're who they claim to be, or they aren't. No social engineering. No deepfake voice that works. No password reset handed to the wrong person.
With Avatier ICC, you know every identity the moment a failure starts — workforce verified and operational in a single day. No re-enrollment. No MDM rebuild. No help-desk queue full of callers you can't verify.
And what the card does today is just the start. Ask us where it goes next.
Click the Book Meeting button to schedule a quick fifteen minute call. We'll walk your team through the Iranian playbook on your stack — and show you what verified recovery looks like.
Device-Dependent MFA vs
Deviceless Authentication
Device-Dependent MFA
Identity Challenge Card
With this fallback identity layer, Stryker's rebuild would have been days, not weeks.
Three Factors. Zero Device Dependency.
Each authentication combines three independent factors — none of which require a phone, an app, or a network connection. That's what makes it Deviceless MFA.
Challenge Card Factor
A randomized grid response unique to each card. The system asks for a coordinate — only the person holding the physical card can answer. It's the factor that makes the card deviceless.
Private Knowledge Factor
A secure PIN known only to the user. Even if someone finds the card, they cannot authenticate without this second piece.
Identity Anchor Factor
An employee ID or account number that binds the challenge to a specific person — closing the loop between card, knowledge, and identity.
See Deviceless Authentication. Try It.
Understand It in 60 Seconds.
Self Enrollment or Auto Enroll Everyone at Once.
See the full Deviceless MFA enrollment flow from start to finish — a user receives their card, a temporary pin, and completes their first identity challenge. One day. Every worker. No devices.
This is
Deviceless MFA.
Try it.→
A simple idea: a physical, air-gapped authenticator that keeps working when everything device-bound fails. No phone. No app. No network. That's Deviceless MFA.
No phone required
No app required
No network required
Works when device MFA fails
Deploys in one day
Zero help-desk bottleneck
| # | A | B | C | D | E |
|---|---|---|---|---|---|
| 1 | INSTALL POWDER | GARDEN BRIDGE | MARBLE SILVER | ROCKET WINDOW | GUITAR CASTLE |
| 2 | PLANET ANCHOR | TURTLE FOREST | BASKET TEMPLE | VELVET PIRATE | COTTON DRAGON |
| 3 | CANYON MAGNET | PUZZLE ORANGE | VIOLET BEACON | COPPER JUNGLE | CARPET MONKEY |
| 4 | HARBOR KNIGHT | VISION QUARTZ | JASPER WILLOW | SUMMIT STREAM | PARROT FABRIC |
| 5 | MEADOW COBALT | FABRIC SPHINX | FALCON BINARY | ORCHID PRISM | LANTERN OXYGEN |
Coordinate C2 — TOP word
Your PIN 1234
Employee ID EMP-48291
How Three-Factor Works
· Challenge Card Factor — Find the coordinate (e.g., A1, B3) and enter the TOP or BOTTOM word
· Private Knowledge Factor — Read your 4-digit PIN, then enter it in the PIN field
· Identity Anchor Factor — Your Employee ID is verified automatically
· Both factors required — The word and PIN must both be correct to gain access
· New challenge — Click 'New Game' to randomize a fresh coordinate and PIN
The Business Value of
Deviceless MFA Mapped to Who's Buying
Every persona has different success criteria. See the outcomes that matter to your role — from closing audit gaps to defining a new market category.
Auditors expect 100% MFA coverage — but device-dependent solutions leave 80% of your workforce unprotected. The Identity Challenge Card eliminates every exception. Deviceless MFA is how you get to 100% with no asterisks.
Eliminate the 80% MFA Gap with Deviceless MFA
Most MFA mandates require all users — but device-based solutions exclude factory floors, shared workstations, field staff, and contractors. The Challenge Card closes every exception, giving auditors complete coverage evidence with no asterisks.
Resist Push Fatigue & Real-Time Phishing
Air-gapped authentication eliminates push-notification hijacking, SIM-swap, and real-time phishing attacks that defeat SMS and TOTP. The challenge/response is offline and unreplayable — no interception vector exists.
Maintain Audit-Ability & Policy Enforcement
Card issuance, expiration, re-enrollment, and revocation are all logged and policy-enforced. Admins set expiry windows; users receive automated reminders. Every access event is traceable — no gaps in the audit trail.
Ready to close your compliance gaps with Deviceless MFA?
See how the Identity Challenge Card — Deviceless MFA — satisfies auditors and protects every worker in days, not months.
Built for Global Workforces
Challenge cards available in 29 languages for multilingual deployment across global workforces and customer-facing support environments.
Deviceless MFA, Trusted in Regulated Environments
The Identity Challenge Card is Deviceless MFA engineered for regulated workloads: zero PII on the card, full lifecycle auditability, and an architecture that satisfies NIST 800-63B, SOC 2, PCI-DSS v4, and ISO 27001 on the first audit pass.
Privacy by Architecture
No PII on the card — nothing to breach
- Zero personal information stored on the physical card
- No name, no ID number, no user mapping printed or encoded
- A lost card cannot be exploited without the separate PIN
- Nothing to disclose under breach notification requirements
- Deviceless MFA: privacy by design, not privacy by policy
Full Lifecycle Controls
Every card event is logged and policy-enforced
- Card issuance, expiration, and revocation are fully auditable
- Admin-configurable expiry windows with automated reminders
- Service Desk use auto-expires the card immediately after use
- Re-enrollment flows enforce policy before issuing replacements
- Complete audit trail — every access event is traceable
Phishing-Resistant by Design
Air-gapped Deviceless MFA with no interception vector
- Eliminates push-notification hijacking and SIM-swap attacks
- Challenge/response is offline and unreplayable
- No network dependency means no man-in-the-middle attack surface
- Meets CISA phishing-resistant MFA guidance (EO 14028)
- Satisfies NIST 800-63B verifier impersonation resistance
Frequently Asked Questions
Everything you need to evaluate Deviceless MFA — by role, by risk, by question asked in the last procurement review.
Security posture & attack surface
What exactly is Deviceless MFA — and how is the Identity Challenge Card different from every other MFA?
Is a printed card actually secure? A lost card means a compromised credential.
We already have MFA. Why does our existing solution leave a documented gap?
How does this meet CMMC, HIPAA, PCI-DSS, and GDPR requirements?
What happens during an active cyberattack when identity systems are down?
Can push bombing or replay attacks work against this?
See Where Deviceless MFA
Fits in Your Environment
No commitment · 30-min Deviceless MFA walkthrough · same-day response
Talk to the team behind the Identity Challenge Card — the first production Deviceless MFA.



