Strategic Tier Feature

You Can't Be
Two Places at Once.

Detect authentications from locations that are physically impossible to reach. If someone logs in from New York and Singapore within an hour, something's wrong.

Impossible Travel Detected

Real-Time Velocity Analysis

Every authentication is checked against recent location history to detect physically impossible travel patterns.

1

Authentication Request

Employee attempts biometric auth from a new location

2

Location Capture

IP geolocation and device GPS (if available) recorded

3

Velocity Calculation

Distance from last auth ÷ time elapsed = travel speed

4

Threshold Check

If speed exceeds max human travel, auth is flagged or blocked

What Gets Caught, What Passes

Smart enough to distinguish legitimate travel from credential theft.

Blocked: Credential Theft

Impossible velocity detected

Employee authenticated from Chicago at 9:00 AM. Two hours later, an authentication attempt comes from Moscow. That's 5,000 miles at 2,500 mph—blocked immediately.

Time gap: 2 hours
Distance: 5,000 miles
Required speed: 2,500 mph

Allowed: Business Travel

Reasonable travel velocity

Employee authenticated from LAX at 8:00 AM. Eight hours later, they authenticate from New York. That's a typical cross-country flight—authentication proceeds.

Time gap: 8 hours
Distance: 2,500 miles
Required speed: 312 mph (reasonable)

Beyond Simple Distance Checks

Sophisticated analysis that reduces false positives while catching real threats.

VPN Awareness

Detects corporate VPN egress points and adjusts calculations. Won't flag employees using approved VPN infrastructure.

Configurable Thresholds

Set custom velocity limits and response actions. Block, challenge, or alert based on your security posture.

Real-Time Alerts

Security team notifications via Slack, email, or webhook when impossible travel is detected.

Trusted Locations

Whitelist office locations, data centers, and known travel destinations to reduce noise.

Step-Up Authentication

Instead of blocking, require additional verification for suspicious but not impossible travel patterns.

Historical Analysis

Learn individual travel patterns over time. Frequent flyers get calibrated thresholds based on their history.

Stop Credential Theft in Its Tracks

Impossible travel detection is available in our Strategic tier and above. Add geospatial intelligence to your authentication security.