7.9highGO

HelpDesk Identity Guard

Automated identity verification workflow that enforces authentication steps before any privileged action like password resets.

DevToolsIT managers and CISOs at mid-to-large enterprises with L1/L2 help desk teams
The Gap

Help desk staff can skip critical identity verification steps under pressure, especially when social engineers impersonate executives with stolen personal details.

Solution

A middleware layer that integrates with AD/ITSM tools and physically blocks password resets until a 2FA challenge is completed. Includes real-time cross-referencing of caller claims against live signals (e.g., Teams status, device enrollment, geo-location) and flags anomalies automatically.

Revenue Model

subscription per seat, tiered by org size

Feasibility Scores
Pain Intensity9/10

This is a 'career-ending mistake' problem. The Reddit post alone (843 upvotes) shows helpdesk staff live in fear of this. MGM lost $100M+ from a single helpdesk social engineering call. CISOs are terrified. The pain is acute, frequent, and has massive downside. People literally lose their jobs over this.

Market Size7/10

TAM: ~500K mid-to-large enterprises globally with L1/L2 helpdesks. At $5-15/user/year for IT staff seats, realistic SAM is $500M-$1B. Not a massive consumer market, but B2B enterprise security budgets are large and growing. The niche is well-defined but not enormous.

Willingness to Pay8/10

Strong WTP signals. After MGM/Caesars, security budgets explicitly allocated for helpdesk hardening. CISOs have budget authority and this is now a board-level concern. Enterprise buyers pay $3-9/user/month for generic MFA — a purpose-built helpdesk solution at $3-8/user/year is a no-brainer line item. Compliance mandates (SOC2, NIST) are creating forced purchases.

Technical Feasibility6/10

Core concept (block password reset until 2FA) is straightforward. However, real-time cross-referencing of Teams status, device enrollment, and geo-location requires deep integrations with Microsoft Graph API, Intune, AD, and ITSM platforms (ServiceNow, Jira Service Management, Freshservice). Each integration is nontrivial. MVP with AD + one ITSM + basic 2FA gate is achievable in 6-8 weeks for a strong dev, but the anomaly detection and multi-signal cross-referencing pushes beyond solo dev MVP territory.

Competition Gap8/10

Critical gap exists: NO existing product combines enforced verification workflow + real-time anomaly detection + contextual signal cross-referencing (Teams status, geo, device posture). Specops enforces workflow but has no intelligence. Nametag has strong identity proofing but no behavioral analysis. Silverfort has risk analysis but no helpdesk-specific workflow. The middleware approach that blocks AND detects is genuinely unoccupied.

Recurring Potential9/10

Textbook SaaS subscription. Security tools are never canceled once deployed (liability risk). Per-seat pricing scales with org size. Once embedded in the helpdesk workflow, switching costs are extremely high. Upsell path to analytics, compliance reporting, and additional integrations. Net revenue retention in security SaaS typically exceeds 120%.

Strengths
  • +Extreme pain intensity with career/company-ending consequences — buyers are motivated by fear, which is the strongest B2B purchase driver
  • +Clear competitive gap: no one combines enforced workflow + anomaly detection + contextual signals in a single middleware layer
  • +Market timing is perfect — post-MGM/Caesars, CISOs have explicit budget for this. You're riding a wave of regulatory and board-level pressure
  • +High switching costs once deployed — embedded in helpdesk workflow makes this very sticky
  • +The Reddit signal (843 upvotes, 89 comments with people sharing their own near-misses) is authentic demand, not hypothetical
Risks
  • !Enterprise sales cycles are 3-9 months — you need runway and patience. Mid-market may be faster but less revenue per deal
  • !Integration complexity is real — AD, ServiceNow, Intune, Teams, Okta, Duo all have different APIs and auth models. Each new integration is engineering investment
  • !Incumbents (Microsoft, Okta, Cisco/Duo) could add a 'verify before reset' feature as a checkbox item and commoditize your core value prop overnight
  • !Nametag is well-funded and laser-focused on this exact niche — you'd be entering a direct fight with a venture-backed competitor that has a head start
  • !Selling security to enterprises requires SOC2 Type II, pen test reports, and security certifications — building trust takes time and money before you even sell
Competition
Specops Secure Service Desk (Outpost24)

Integrates with service desk platforms to enforce identity verification before password resets or account unlocks. Agents cannot proceed until caller passes verification via SMS, email codes, Duo/Okta push, manager approval, or security questions. Deep Active Directory integration.

Pricing: Enterprise sales; estimated $2-5/user/year. Not publicly listed.
Gap: No real-time anomaly detection or behavioral analysis. No biometric or document-based identity proofing. Relies on traditional factors (SMS/email) vulnerable to SIM swap. Dated UI/UX. Limited ITSM integrations compared to newer entrants.
Nametag (getnametag.com)

Purpose-built identity verification for IT helpdesks using cryptographic identity proofing — caller scans government ID and takes live selfie matched via facial recognition. Agent gets verified identity confirmation before proceeding. Designed explicitly to stop MGM/Caesars-style social engineering attacks.

Pricing: Not publicly listed; estimated $3-8/user/year. Per-verification or per-user/year model.
Gap: No anomaly detection or behavioral analysis. Government ID scanning raises privacy/regulatory concerns (GDPR, CCPA, biometric laws). Adds friction to every interaction. Doesn't cover phone-only helpdesks well. Relatively new company — enterprise buyers may hesitate. International ID coverage may be incomplete.
Duo Security (Cisco)

Primarily an MFA platform adapted for helpdesk verification. Agents can trigger Duo Push notifications to the caller's registered device before proceeding with password resets. Also offers Device Trust and Trusted Endpoints features.

Pricing: Duo Essentials ~$3/user/month, Advantage ~$6/user/month, Premier ~$9/user/month
Gap: Not purpose-built for helpdesk — it's MFA adapted for this use case. No enforced helpdesk workflow (agent can skip unless custom-integrated). Fails when user's phone is compromised or unavailable — which is exactly why they're calling. No document/biometric proofing. No helpdesk-specific anomaly detection.
Okta Identity Verification (powered by Persona)

Combines Okta Verify MFA push with document-based identity proofing

Pricing: Okta Workforce Identity starts ~$6/user/month for SSO; MFA add-on ~$3/user/month; Identity Verification is a premium add-on with unclear pricing.
Gap: Identity Verification feature was relatively new — maturity questions remain. Very expensive when fully loaded. Not designed for the helpdesk agent workflow specifically. No enforced service desk process — it's a tool, not a workflow gate. Okta itself was breached via social engineering in 2023, raising trust questions. No real-time anomaly detection on helpdesk patterns.
Silverfort

Unified identity protection platform that extends MFA to any resource including service desk tools. Performs real-time risk analysis on authentication events. Agentless deployment that covers legacy systems, AD, LDAP, and RDP.

Pricing: Enterprise sales only; estimated $$$. Pricing not public.
Gap: Not helpdesk-specific — it's a broad identity security platform. No document or biometric identity proofing. No purpose-built helpdesk agent workflow. No anomaly detection tuned for social engineering call patterns. Very expensive, targets large enterprise only.
MVP Suggestion

A ServiceNow or Freshservice plugin that intercepts password reset tickets and blocks resolution until a 2FA challenge (Duo Push, Okta Verify, or email OTP) is completed by the actual account owner. Add a simple dashboard showing: reset requests blocked, verification success/failure rates, and flagged anomalies (e.g., reset requested outside business hours, requester geo doesn't match AD location). Skip biometric/document proofing for MVP — focus on the enforced gate + basic anomaly flags. Target 3-5 design partners from the Reddit thread commenters.

Monetization Path

Free tier: 10 agents, basic 2FA gate, email OTP only → Starter ($4/agent/month): Duo/Okta push integration, basic anomaly dashboard → Pro ($8/agent/month): Multi-signal anomaly detection (Teams status, geo, device posture), compliance reporting, SIEM integration → Enterprise (custom): Custom integrations, dedicated support, SLA guarantees, on-prem deployment option

Time to Revenue

3-5 months to first paying customer. Month 1-2: Build MVP with one ITSM integration + basic 2FA gate. Month 2-3: Deploy with 3-5 design partners from sysadmin communities. Month 3-5: Convert design partners to paid, begin outbound to similar companies. Enterprise deals may take 6-9 months but mid-market (500-2000 employees) can close in 4-8 weeks with a compelling pilot.

What people are saying
  • I completely fucked up and forgot to authenticate the user
  • I reset the AD password without authenticating the user
  • implement some automation to ensure that password resets physically cannot be processed without a 2FA code
  • an opportunity for management to maybe add a few more guardrails