HYPR Features
Authentication type (8)
SMS-Based
As reported in 11 HYPR reviews.
Sends a one-time passcode (OTP) via SMS.
Voice-Based Telephony
11 reviewers of HYPR have provided feedback on this feature.
Provides a one-time passcode (OTP) via voice-call.
Email-Based
11 reviewers of HYPR have provided feedback on this feature.
Sends a one-time passcode (OTP) via email.
Hardware Token-Based
This feature was mentioned in 14 HYPR reviews.
Supports hardware tokens, which are often USB-sized, fob-like devices that store codes.
Software Token
As reported in 12 HYPR reviews.
Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline.
Biometric Factor
As reported in 14 HYPR reviews.
Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor.
Mobile-Push
13 reviewers of HYPR have provided feedback on this feature.
Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet.
Risk-Based Authentication
Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user.
Functionality (6)
Multi-Device Sync
As reported in 14 HYPR reviews.
Allows the use of tokens on multiple devices. This feature can also be turned off if the user does not want this.
Backup
Offers encrypted backup recovery stored by the vendor.
FIDO2-compliant
As reported in 11 HYPR reviews.
Offers FIDO2-enabled authentication method
Works with hardware security keys
11 reviewers of HYPR have provided feedback on this feature.
Works with hardware security keys
Multiple authentication methods
Based on 13 HYPR reviews.
Offer users multiple ways to authenticate including, but not limited to: mobile push on trusted devices, FIDO-enabled devices, physical security keys, keycards, smart watches, biometrics, QR codes, desktop app + pin, and others.
Offline or no-phone solution
12 reviewers of HYPR have provided feedback on this feature.
Offers solutions when users are offline or do not have access to a mobile phone.
Integration (4)
Uses Open Standards
Connections use open standards such as SAML or RADIS.
Mobile SDK
Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications.
Workforce Authentication
10 reviewers of HYPR have provided feedback on this feature.
Integrates with identity and access management (IAM) solutions to manage workforce authentication.
Customer Authentication
Integrates with customer identity and access management (ICAM) solutions to manage customer authentication.
Administration (7)
Encryption
Encrypts all data transfers using end-to-end encryption.
Audit Trails
10 reviewers of HYPR have provided feedback on this feature.
Provides audit trails to monitor useage to reduce fraud.
Regulatory Compliance
Complies with regulations for strong customer authentication such as KYC, PSD2, and others.
Bi-Directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application.
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes.
Cloud Directory
Provides or integrates with a cloud based directory option that contains all user names and attributes.
Application Integrations
Integrates with common applications such as service desk tools.
Implementation (3)
Easy Setup
15 reviewers of HYPR have provided feedback on this feature.
Offers an easy to understand user interface to make setup smooth.
Mobile SDK
As reported in 11 HYPR reviews.
Offers a mobile software development kit (SDK) for iOS, Blackberry, and Android.
Web SDK
Offers a software development kit (SDK) for web-based applications.
Identity Verification Functions - Identity Verification (5)
Multi-Method Verification
Supports multi-method identity verification including documents, biometrics, and database cross-checks.
AI Document Check
Performs automated document authentication using OCR and AI/ML.
Biometric Face Match
Conducts biometric face matching (selfie-to-ID verification).
Integration Options
Offers identity verification functionality via API, SDK, or hosted interface.
Workflow Orchestration
Provides configurable identity verification workflows and logic-based orchestration.
Risk & Fraud Prevention - Identity Verification (3)
Liveness Detection
Offers liveness detection to prevent spoofing and presentation attacks.
AI Risk Scoring
Generates real-time identity risk scores using AI/ML or rule-based logic.
Document Forensics
Detects fraudulent or tampered documents through forensic analysis.
Compliance & Governance - Identity Verification (3)
Standards Compliance
Supports compliance with NIST Identity Assurance Levels (IAL2, IAL3).
AML/PEP Screening
Integrates AML, PEP, and sanctions list screening into the identity verification process.
Global Coverage
Supports global identity document verification across multiple countries and regions.


