With GCM you can eliminate the number one attack vector, stolen credentials, while creating a frictionless and passwordless user experience. GCM is deployed as an overlay, meaning you don't need to deploy new infrastructure, upgrade your hardware, or change your workflows. With GCM, you can be up and running in days.