Avatier
BG
Accent
INT
100
A Category Manifesto

Authentication
Without
The Device.

Passwordless was never supposed to mean phone-dependent. We are defining the category that fixes that mistake.

Identity Anywhere™ — 2026

01
I · The Uncomfortable Truth

Passwordless Broke Its
Own Promise.

The industry declared war on passwords. Biometrics. Push notifications. Magic links. Authenticator apps. A decade of innovation, all solving the same problem for the same person — someone sitting at a desk, smartphone in hand, connected to a network.

Then the industry quietly looked away from everyone else.

The factory worker whose phone stays in a locker. The field surgeon in a sterile suite. The defense contractor in a shielded facility. The call center agent who started this morning and may be gone in 90 days. The operator in a communications-denied environment where a push notification is not just inconvenient — it is a security threat.

These are not edge cases. These are tens of millions of workers. And every one of them has been issued the same security policy: an exception.

02
II · The Enemy

Device Dependency
Is The Enemy.

Every dominant authentication method is built on the same broken assumption: that every worker has a device, has connectivity, and controls both. They don't. That is why the exceptions exist.

Failure Mode 01

Mobile Authenticator Apps

Requires a smartphone, a data plan, app installation, OS compatibility, and battery. Fails the moment the device is absent, dead, or forbidden. Network-dependent at the moment of authentication.

Failure Mode 02

Push Notification MFA

Requires network, device, and human judgment. MFA fatigue attacks work precisely because users approve pushes they should not. The adversary's attack surface is your own UI.

Failure Mode 03

SMS & Phone OTP

SIM swap attacks are trivial and well-documented. Carrier infrastructure is not your security perimeter. NIST has flagged it. The industry keeps deploying it.

Failure Mode 04

Hardware TOTP Tokens

$30–60 per user. Inventory overhead. Shipping cycles. Replacement requests clogging the help desk. Still a device dependency — just an expensive one with a longer list.

Failure Mode 05

Biometrics

Device-bound. Privacy and compliance exposure. Fails in gloves, masks, and sterile environments. The most intimate possible credential — stored on infrastructure you do not fully control.

The Core Flaw

The Assumption Behind All of It

Every method above assumed users have smartphones, have connectivity, and have the right to carry personal devices on-premise. That assumption was never universally true. They built anyway.

The Category Declaration

Deviceless Authentication Is Not a Workaround. It Is the Category.

When the mechanism is irrelevant and the principle is sovereign — you don't need a device to prove who you are — that is not an alternative. That is a new way of thinking about identity.

III · Our Answer

A Card.

A PIN.

A Guarantee.

The Identity Challenge Card is a printed grid — words in cells, coordinates on demand. When you authenticate, the system names a coordinate. You find the word. You type it alongside your PIN. You are in.

No app. No battery. No signal. No hardware to procure, patch, or replace. No MDM enrollment. No personal device drafted into corporate security compliance.

The grid is the something you have. The PIN is the something you know. One without the other is useless. Together, they constitute genuine two-factor authentication — air-gapped, offline, and impervious to every network-based attack vector.

Cyber attackers cannot compromise paper. That is not a tagline. That is an architectural truth.

Identity Challenge CardGenerated · Card ID: B7eCB15
#ABCDE
1
INSTALL
POWDER
GARDEN
BRIDGE
MARBLE
SILVER
ROCKET
WINDOW
GUITAR
CASTLE
2
PLANET
ANCHOR
TURTLE
FOREST
BASKET
TEMPLE
VELVET
PIRATE
COTTON
DRAGON
3
CANYON
MAGNET
PUZZLE
ORANGE
VIOLET
BEACON
COPPER
JUNGLE
CARPET
MONKEY
4
HARBOR
KNIGHT
VISION
QUARTZ
JASPER
WILLOW
SUMMIT
STREAM
PARROT
FABRIC
5
MEADOW
COBALT
FABRIC
SPHINX
FALCON
BINARY
ORCHID
PRISM
LANTERN
OXYGEN
Live Challenge

Enter coordinate B4 — provide the TOP word

· Find the coordinate — Look for the row and column (e.g., A1, B3, E5)

· Choose the word — You'll be asked for the TOP or BOTTOM word

· Answer correctly — Enter the TOP or BOTTOM word as requested

· Case doesn't matter — You can type in uppercase or lowercase

IV · The Principles

What Deviceless
Authentication Demands.

This is not a product category defined by a single technique. It is defined by a set of commitments that every solution in the category must keep.

Principle 01

No Device Shall Be a Prerequisite

Authentication cannot require the user to own, carry, charge, or install anything. Proof of identity must be achievable with what a person inherently has: knowledge and a physical token they can hold without electronics.

Principle 02

Air-Gapped. No Network. No Attack Surface.

A credential that requires no network at the moment of authentication has no network attack surface. The absence of connectivity is the safest possible design choice. We treat it that way.

Principle 03

Coverage Is Binary

Authentication that works for 80% of your workforce does not protect your organization. It creates a documented 20% vulnerability. Deviceless authentication closes every exception. All workers. All environments. Always.

Principle 04

Authentication Is Not Governance

Issuing a credential and walking away is not security. Every credential must have a lifecycle — expiration policies, automatic invalidation, immutable audit logs, and identity-verified re-enrollment. The card is governed, not just printed.

Principle 05

Personal Devices Are Not Job Requirements

Demanding that employees install corporate security software on their personal smartphones is a liability transfer, not a security policy. Deviceless authentication separates corporate identity from personal hardware permanently.

Principle 06

Simplicity Is Security

Complexity is an attack surface. The more steps, devices, and networks involved in authentication, the more opportunities for exploitation. The simplest mechanism that achieves genuine two-factor assurance is the most secure mechanism.

V · The World We Are Building

Every Worker.
Every Environment.
Protected.

The future of enterprise authentication is the recognition that identity must work everywhere — with or without a device, with or without a signal, with or without a smartphone that belongs to you.

Security audits find no MFA exemptions — because none exist. Every worker, in every environment, is covered.

Compliance frameworks are satisfied not with workarounds, but with verifiable, policy-enforced audit trails across the entire workforce.

The help desk is not overwhelmed by lockouts from devices workers forgot, lost, or were never permitted to bring.

Passwordless no longer means phone-dependent. It means any method that eliminates the traditional password — whatever the environment demands.

Defense contractors, nurses, line workers, and field agents authenticate with the same confidence as the executive at a corporate desk.

VI · Compliance Alignment

Every Framework Has a Gap.

This Closes It.

Compliance frameworks don't create the MFA exception problem — they expose it. Every major standard requires authentication that works for every worker in every environment. Device-dependent MFA cannot deliver that. A governed Identity Challenge Card can.

CMMC

AC & IA Domains

CMMC requires verifiable MFA for all users across all environments — including communications-denied facilities and classified spaces where smartphones are prohibited by policy.

IA.3.083 · AC.2.006 · IA.1.077

Zero exemptions. All AC/IA domain requirements satisfied across the entire workforce.

HIPAA

Technical Safeguards — 45 CFR § 164.312

Healthcare's highest-risk environments — sterile suites, shared clinical workstations, isolation wards — are the least compatible with phone-based MFA. The standard requires person authentication, unique ID, and audit controls.

§ 164.312(d) · (a)(2)(i) · (b)

Person auth + unique ID + audit controls — all satisfied. No personal device processing.

PCI-DSS v4.0

Requirement 8 — Authentication & Password Requirements

Requirement 8 mandates strong MFA for all users with access to cardholder data. Any organization with workers in environments where device-dependent MFA cannot be uniformly enforced carries documented compliance risk.

Req. 8.4.2 · 8.3.6 · 8.2.4

MFA + password elimination + lifecycle governance — closed by design.

GDPR Art. 32

Security of Processing

Device-dependent MFA creates two GDPR exposures: enrolling personal phones constitutes personal data processing requiring a lawful basis, and known MFA exemptions may constitute failure to implement appropriate technical measures.

Article 32 · Art. 5(1)(f)

No personal data processed by the auth mechanism. Zero documented vulnerability gaps.

What Each Framework Gets

CMMC

IA.3.083

Zero exemptions. All AC/IA domain requirements satisfied across the entire workforce.

HIPAA

§ 164.312(d)

Person auth + unique ID + audit controls — all satisfied. No personal device processing.

PCI-DSS v4.0

Req. 8.4.2

MFA + password elimination + lifecycle governance — closed by design.

GDPR Art. 32

Article 32

No personal data processed by the auth mechanism. Zero documented vulnerability gaps.

VII · Maturity Model

Where Does Your

Organization Stand?

Every organization with an MFA exception policy is somewhere on this scale. The question is not whether deviceless authentication is necessary. It is how far the gap currently extends between policy and reality.

01
INITIALException-Managed Authentication

MFA is deployed for the majority of the workforce. Documented exceptions exist for workers in device-restricted or connectivity-denied environments. Every exemption is a documented vulnerability — a gap the policy acknowledges and accepts rather than closes.

02
REACTIVEPilot Deviceless Deployment

Deviceless authentication has been piloted for a subset of previously exempt workers. Coverage is improving but not complete. Legacy exemptions remain for un-migrated populations. An expansion roadmap exists but is not enforced. The documented attack surface is shrinking but still present.

03
DEFINEDZero Exceptions Across All Environments

Deviceless authentication is deployed across every previously exempt population. The policy contains no carve-outs. All workers in all environments are covered under the same framework. The compliance posture is now defensible. This is the minimum acceptable standard.

04
MANAGEDGoverned Credential Lifecycle

Credential issuance, expiration, invalidation, and re-enrollment are policy-enforced and system-executed — not manually managed. Audit evidence is immutable and continuous. The post-issuance risk window is closed. Governance is not a quarterly event; it is the operating state.

05
OPTIMIZEDContinuous Assurance — Zero Undocumented Populations

Real-time coverage dashboards confirm 100% enforcement at all times. New-hire onboarding triggers automatic credential issuance. Federated with SSO and IGA. The gap between audit cycles no longer exists because assurance is continuous, not periodic.

VIII · Implementation Models

Four Ways to Deploy.

These models are not mutually exclusive. Most enterprises use a combination. The right starting point depends on existing infrastructure, workforce profile, and where the coverage gap is largest.

01Standalone

No upstream federation. No network dependency at authentication time. Card + PIN managed entirely within the platform — deploys without touching existing infrastructure.

02Federated Hybrid

The Identity Challenge Card covers the workers your incumbent MFA cannot reach. Both factors coexist. Policy routes each worker to the right one.

03Integrated with IGA

The card is provisioned, expired, and revoked by joiner/mover/leaver workflows. One audit record across every credential type.

04Zero-Trust Integration

Card + PIN satisfies the ZT policy engine without device posture signals. Identity — not device — is the perimeter.

The model is not the constraint. The coverage gap is. Every model closes it.

This Is How It
Actually Works.

Category arguments are won in the boardroom. They are lost in the operations review. Here is the operational reality — not the pitch, not the demo, not the edge-case hedge.

Deployment takes one day.

A single IGA workflow bulk-provisions cards for every worker simultaneously. No hardware procurement cycle. No app install. No per-worker IT session.

Workers receive a card. Nothing else.

Same delivery channel as an ID badge — on-site, mailed, or kiosk-printed on demand. No enrollment appointment. No device pairing. No help desk touchpoint required.

Nothing runs at authentication time.

No server call. No network dependency. The workstation resolves the challenge locally. Infrastructure is not part of the transaction.

A lost card is revoked in seconds.

There is no device to locate, wipe, or recover. Revocation is immediate in the IGA platform. A replacement card is issued the same day. Mean time to resolution: minutes, not hours.

Sterile suite. Faraday cage. Forward operating base.

These are not edge cases. They are the primary use case. No signal required. No device required. The card works wherever a person can hold paper.

Expiration is automatic, not administrative.

The IGA platform triggers re-enrollment on the governance schedule. The old coordinate set is invalidated. The new card is issued. The audit trail is continuous and immutable throughout.

The card is a first-class identity object.

It participates in joiner/mover/leaver workflows, access certifications, policy enforcement, and audit reporting — identical to any other governed credential.

Every event is on the record.

Every authentication attempt — timestamp, coordinate challenged, outcome — is logged. Every issuance and revocation is recorded. The governance history begins at provisioning and ends at expiration.

The operational questions have operational answers. The category does not ask enterprises to trade risk for coverage. It removes both.

IX · Vendor Landscape

Who Plays Where —

And Who Still Requires a Device.

Every vendor in every category shares one architectural assumption: the user has a device, a signal, or a power source. The Identity Challenge Card removes that assumption entirely.

Category 1Deviceless & Offline MFA — Direct Competitors

These vendors offer methods that reduce or eliminate smartphone dependency. This is the direct competitive category. Each has meaningful limitations the Identity Challenge Card closes.

Vendor / ProductAvatier Advantage
Entrust Identity Grid CardTime-limited, auto-expiring, identity-verified re-enrollment, full immutable audit log.
HID Global ActivID Grid / Smart CardNo reader hardware. Only solution with IGA-integrated, policy-enforced credential lifecycle.
Thales (SafeNet) Printed OTP CardsGoverned issuance, automatic invalidation, policy-enforced expiration — unavailable in Thales printed cards.
FEITIAN OTP / Challenge-ResponsePaper-based. No battery. No hardware to procure. Full lifecycle via Avatier platform.
WiKID Systems Soft TokenNo software, no device, no app. Fully operational in communications-denied environments.
Avatier Identity Challenge CardAir-gapped · Governed lifecycle · IGA-native · Deploys in hours · Zero per-user hardware cost.
No competitor in any category governs what they cannot connect.

You Already Know Which Workers
You Left Behind.

Every security leader knows where their MFA exceptions are. They wrote the exceptions themselves, because the tools gave them no other choice. The Identity Challenge Card removes every justification for every exception. No new infrastructure. No new devices. Deploys in hours.

Enroll every employee.  All in one day.

Closing Definition

Deviceless Authentication

Authentication does not require a device. It requires proof of identity and a governance system rigorous enough to stand behind it. That is the standard. Everything else is a workaround.

Network dependency at the moment of authentication

100%

Workforce coverage — including every environment you previously exempted

2F

True two-factor: something you have, something you know. No device required.

Ready for Identity-Native Secure Call Center AI?

Join 1,000+ enterprise organizations. No pushy sales — we show you the product.

No commitment · 30-min live demo · same-day response

U.S. Air Force
U.S. Army
AstraZeneca
Bayer
BBC
Broward County
Build-A-Bear
The Cosmopolitan
DHL
Emerson
ESPN
Fox News
GSA
Humana
ING
Lockheed Martin
Marriott
MillerCoors
NASA
Nordstrom
Oscar Mayer
Pfizer
Rockwell Collins
SC Johnson
Sprint Canada
Starbucks
Steak 'n Shake
USA Today
Welch's
Vail Resorts
Visa
Volkswagen
Zep
U.S. Air Force
U.S. Army
AstraZeneca
Bayer
BBC
Broward County
Build-A-Bear
The Cosmopolitan
DHL
Emerson
ESPN
Fox News
GSA
Humana
ING
Lockheed Martin
Marriott
MillerCoors
NASA
Nordstrom
Oscar Mayer
Pfizer
Rockwell Collins
SC Johnson
Sprint Canada
Starbucks
Steak 'n Shake
USA Today
Welch's
Vail Resorts
Visa
Volkswagen
Zep