List of Stytch Authentication Customers
San Francisco, 94111, CA,
United States
Since 2010, our global team of researchers has been studying Stytch Authentication customers around the world, aggregating massive amounts of data points that form the basis of our forecast assumptions and perhaps the rise and fall of certain vendors and their products on a quarterly basis.
Each quarter our research team identifies companies that have purchased Stytch Authentication for Identity and Access Management (IAM) from public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources, including the customer size, industry, location, implementation status, partner involvement, LOB Key Stakeholders and related IT decision-makers contact details.
Companies using Stytch Authentication for Identity and Access Management (IAM) include: Descript, a United States based Professional Services organisation with 150 employees and revenues of $50.0 million, Replit, a United States based Professional Services organisation with 150 employees and revenues of $20.0 million, Tome, a United States based Media organisation with 45 employees and revenues of $10.0 million and many others.
Contact us if you need a completed and verified list of companies using Stytch Authentication, including the breakdown by industry (21 Verticals), Geography (Region, Country, State, City), Company Size (Revenue, Employees, Asset) and related IT Decision Makers, Key Stakeholders, business and technology executives responsible for the software purchases.
The Stytch Authentication customer wins are being incorporated in our Enterprise Applications Buyer Insight and Technographics Customer Database which has over 100 data fields that detail company usage of software systems and their digital transformation initiatives. Apps Run The World wants to become your No. 1 technographic data source!
Apply Filters For Customers
| Logo | Customer | Industry | Empl. | Revenue | Country | Vendor | Application | Category | When | SI | Insight |
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Descript | Professional Services | 150 | $50M | United States | Stytch | Stytch Authentication | Identity and Access Management (IAM) | 2024 | n/a |
In 2024, Descript implemented Stytch Authentication as its Identity and Access Management (IAM) solution to support product and growth use cases in the United States. The company migrated from Auth0 to Stytch Authentication to obtain a more flexible, enterprise-ready authentication stack, improving account linking and enabling on-brand login controls for customer-facing workflows.
Stytch Authentication was configured to run branded login flows, account linking workflows, and developer-facing authentication primitives consistent with Identity and Access Management (IAM) capabilities. The implementation included observability instrumentation to capture experiment telemetry and conversion signals, and it explicitly supported a Google OneTap experiment as part of growth testing. These configuration choices aligned authentication UX with product conversion objectives while preserving standard IAM functional workflows.
Operational ownership centered on product and growth teams in the United States, with engineering and security teams responsible for integration and observability instrumentation. The deployment established a clear path to enterprise features such as SCIM provisioning and single sign-on SSO, positioning Stytch Authentication for forthcoming enterprise onboarding and access governance requirements.
The migration produced an estimated 8% lift in conversions from the Google OneTap experiment and delivered better observability for growth experiments. Stytch Authentication now serves as Descript's central Identity and Access Management (IAM) layer for product and growth functions, while providing a roadmap to enterprise provisioning and SSO capabilities.
|
|
|
Replit | Professional Services | 150 | $20M | United States | Stytch | Stytch Authentication | Identity and Access Management (IAM) | 2024 | n/a |
In 2024, Replit implemented Stytch Authentication to stop large waves of automated sign-ups and to prevent downstream abuse on Replit's free tier, improving anti-abuse and fraud prevention for the product team in the United States. The implementation is categorized under Identity and Access Management (IAM) and sits at the front of the customer onboarding flow to enforce account-level controls before provisioning resources. This placement reduced attack surface for downstream product services and centralized access decisioning for new user creation on the free tier.
Stytch Authentication was configured to provide programmatic verdicts and audit logs, which are explicit capabilities used by Replit to distinguish automated sign-ups from legitimate users. The implementation consolidated authentication and anti-abuse controls into a single orchestration point, enabling automated blocking and clearer decision metadata for each sign-up event. These configuration choices reduced manual investigation by engineering teams, allowing engineers to focus on more complex abuse cases while product teams tuned policy thresholds.
Operational coverage targeted Replit's product and engineering functions in the United States and focused specifically on the free tier sign-up workflow. The solution integrated into the sign-up authentication flow to surface risk signals and verdicts before account activation, and it produced audit trails for downstream investigations and compliance. Governance shifted toward centralized decisioning, where product owners used verdict metadata and logs to iterate on anti-abuse rules and escalate complex incidents to engineering.
|
|
|
Tome | Media | 45 | $10M | United States | Stytch | Stytch Authentication | Identity and Access Management (IAM) | 2024 | n/a |
In 2024, Tome migrated tens of millions of users and organizations from Auth0 to Stytch Authentication, deploying Stytch B2B to achieve a zero-downtime migration and native multi-tenant alignment. The migration targeted Identity and Access Management (IAM) for Tome's user and organization authentication flows in the United States and completed the bulk of the work in under a month.
Stytch Authentication was configured to support B2B tenancy models and to integrate device fingerprinting for account-abuse prevention, aligning authentication workflows with organization-level tenant objects and preserving session continuity. The implementation covered core IAM capabilities including authentication, authorization, session management, tenant mapping, and device-based risk signals, embedding fraud prevention controls directly into the access layer.
The project replaced Auth0 with Stytch B2B while maintaining production availability through a coordinated, low-risk migration approach that preserved active sessions and authentication state. Operational ownership rested with engineering and security teams, and the migration freed two to three engineers to return to core product development while improving reliability and observability.
Governance emphasized a rapid, low-risk cutover and enhanced monitoring, with device fingerprinting feeding account-abuse prevention policies and incident detection. Tome's deployment of Stytch Authentication centralized multi-tenant authentication and account security within its Identity and Access Management (IAM) stack while maintaining zero-downtime service continuity.
|
Buyer Intent: Companies Evaluating Stytch Authentication
- G&A Hackl Gastronomie Austria, a Austria based Leisure and Hospitality organization with 110 Employees
Discover Software Buyers actively Evaluating Enterprise Applications
| Logo | Company | Industry | Employees | Revenue | Country | Evaluated | ||
|---|---|---|---|---|---|---|---|---|
| No data found | ||||||||