Build trust in online payments
Financial institutions (FIs) are facing a rising tide of cyber threats such as phishing and account takeovers. Strong customer authentication (SCA) solutions provide an additional layer of security, making it more difficult for fraudsters to impersonate customers and carry out fraudulent activities. Moreover, SCA allows FIs to achieve a harmonious blend of security, user experience, and regulatory compliance.

Bolster Security
Mitigate frauds and account takeovers. Significantly boost the security of online payment transactions.

Build customer trust
Demonstrate a commitment to safeguarding customers' financial transactions while prioritizing convenience.

Ensure compliance
Comply with regulatory standards such as the EU Payment Services Directive (PSD2).
What is Strong Customer Authentication?
Strong customer authentication is a mandatory security measure introduced by the EU Payment Services Directive (PSD2) to mitigate fraud and enhance the safety of online payments. SCA mandates financial institutions to employ at least two distinct authentication methods to confirm a financial transaction. These methods may involve factors like something known to the customer (e.g., password), something possessed by the customer (e.g., phone or security token), or something inherent to the customer (e.g., fingerprint).
- Why is strong customer authentication important?
- What are some challenges that financial institutions face when implementing SCA?
- How can I streamline access while maintaining compliance?
- Why is SCA implementation on the rise in digital banking?
- How has digital banking authentication evolved?
Why is strong customer authentication important?
By using multiple forms of authentication, SCA makes it more difficult for fraudsters to impersonate the customer and complete a fraudulent transaction. This helps protect both Fls and customers from fraud's costly and disruptive effects. SCA is also important for ensuring compliance with regulatory requirements and maintaining the trust of customers in the online payment process.
What are some challenges that financial institutions face when implementing SCA?
How can I streamline access while maintaining compliance?
Why is SCA implementation on the rise in digital banking?
How has digital banking authentication evolved?

#2024TRUSTINDEX
81% of consumers
expect some form of strong authentication despite strong authentication historically associated with frustrating customer experiences. Passkeys can serve as a component in attaining a balance.

Navigate PSD2 regulations and compliance with Thales.
The PSD2 regulation drastically impacts the financial ecosystem and infrastructure for banks, fintechs, and businesses using payment data to benefit consumers. Here is everything you need to know about PSD2.

How SCA works and how we can help
SCA works by verifying a user's identity through multiple factors such as passwords, biometrics, or possession of a device.
Users must provide authentication through at least two of the following factors to complete a transaction:
Knowledge factors
This involves something only the user knows, such as a password, PIN, or answers to security questions.
Possession factors
This involves something only the user possesses, such as a mobile device, smart card, or token.
Inherence factors
This involves something inherent to the user, such as biometric data like fingerprint, facial recognition, or iris scans.
Thales provides tailored security solutions for FIs, including cloud-based managed services, to facilitate seamless and cost-effective implementation of SCA and risk management protocols.
Our cloud-based managed services enable FIs to combine identity-proofing and strong customer authentication to secure onboarding and digital banking access, within a single platform.


For decades, financial institutions worldwide have entrusted Thales to safeguard access to their digital services. With our wide range of solutions specifically designed to protect both financial institutions and end-users, we effectively address the security, functional, and regulatory needs of the industry."
Effectively validate identities with tailored authentication
Tailor your authentication journey to your organization's needs, users, and risk levels for a robust and cost-effective system.
Integrate different authentication options, including:
One-Time Passwords (OTP)
Uses shared secrets to generate one-time passcodes for authentication.
Certificate-based Authentication (CBA)
Utilizes unique encryption keys for authentication and digital signatures, available through Thales USB tokens and smart cards.
Context-based Authentication
Enhances identity verification using contextual information, recommended alongside other strong authentication methods.


Thales Named an Overall Leader
Find the product or service that best meets your needs, and learn why KuppingerCole named Thales a Market Leader, Overall Leader, and Innovation Leader in Access Management