Your browser is out of date and may not display all features of this website.

Like having your own private security guard

Covr is the only true, two-way authentication and the safest form of cyber security on the planet. With Covr, you can offer your users a safe way of authenticating themselves and authorizing transactions via an app on their smartphones. The app is user-friendly and requires no additional hardware. It’s like giving each of your users their own private security guard: no one gets in without approval.

Three-factor, two-channel encryption

Covr fundamentally changes the way information is sent by using a secondary channel (the smartphone) to control the first channel (the computer). Authentication takes place using multi-step encrypted communication via the mobile device. In layman’s terms, this means you can move money or data over a secure communication channel – even when using an unsecure Wi-Fi connection.

100% safe

When Covr sends information back and forth to the smartphone, it travels safely over IP instead of SMS, so that even when users are on an unsecured network, communication cannot be breached.


With Covr users no longer have to remember complicated passwords. There are no secret questions to answer. No security hoops to jump through. You as a user are in total control with a 6-digit access code that you select yourself.

Take a test drive

See how easy it is to receive and validate a request with Covr. Completely secure.


Banks transactions, store purchases, cloud-based databases, online gaming and even the Internet of Things can use Covr to ensure 100% protection from ID theft, phishing, skimming and credit card hijacking.

The state of insecurity

Today, all transactions of highly confidential value are exposed to cyber attacks – and theft has become almost commonplace. Yet most enterprises are unprepared to fend off attackers. Many end up paying for this lack of preparation in the form of costly fixes and downtime, ID theft, and sometimes irreparable damage to their reputations.

Digital security