case study

Beyond the Device: How T-Mobile and CLEAR Are Enhancing Secure Authentication

June 11, 2025
Maximize security, minimize friction with CLEAR

Reach out to uncover what problems you can solve when you solve for identity.

Thank you! Your submission has been received. Someone from our team will be in touch shortly.
Oops! Something went wrong while submitting the form.
case study

Beyond the Device: How T-Mobile and CLEAR Are Enhancing Secure Authentication

June 11, 2025
Maximize security, minimize friction with CLEAR

Reach out to uncover what problems you can solve when you solve for identity.

Thank you! Your submission has been received. Someone from our team will be in touch shortly.
Oops! Something went wrong while submitting the form.
case study

Beyond the Device: How T-Mobile and CLEAR Are Enhancing Secure Authentication

June 11, 2025
Maximize security, minimize friction with CLEAR

Reach out to uncover what problems you can solve when you solve for identity.

Thank you! Your submission has been received. Someone from our team will be in touch shortly.
Oops! Something went wrong while submitting the form.
case study

Beyond the Device: How T-Mobile and CLEAR Are Enhancing Secure Authentication

June 11, 2025
case study

Beyond the Device: How T-Mobile and CLEAR Are Enhancing Secure Authentication

June 11, 2025
case study

Beyond the Device: How T-Mobile and CLEAR Are Enhancing Secure Authentication

June 11, 2025
PARTNER SPOTLIGHT

Beyond the Device: How T-Mobile and CLEAR Are Enhancing Secure Authentication

INDUSTRY
Telecommunications
COMPANY SIZE
Enterprise
INDUSTRY
Telecommunications
COMPANY SIZE
Enterprise

Overview

T-Mobile connects people and businesses with America’s largest and fastest 5G network. To help stay ahead of the evolving threat landscape, the company sought an identity solution that could move beyond legacy authentication methods and strengthen enterprise security by adding a fast, secure, and scalable biometric MFA layer across its operations.

“True security starts with identifying the human behind the device. That’s when CLEAR came into the picture.”

- Eric Jensen, Sr. Director, Cybersecurity, T-Mobile

“It became evident that true security and identity starts with the human. That was the piece we weren’t yet doing... and that’s when CLEAR came into the picture.”

Eric Jensen
Sr. Director, Cybersecurity, T-Mobile

The Challenge

Today’s threats include cybercriminals who are outpacing outdated screening and authentication methods, posing as trusted employees to gain access to sensitive systems and data. According to estimates from the U.S. Treasury, State Department, and FBI, scams involving fake IT workers have generated hundreds of millions of dollars annually since 20181—highlighting the need for identity-first strategies that strengthen cybersecurity and protect business continuity.

T-Mobile recognized that addressing the rapidly shifting threat landscape needed more than stronger passwords or traditional MFA prompts. As a step toward strengthening its security, T-Mobile worked with CLEAR to enhance its identity verification with a solution designed to better keep pace with evolving threats.

“It became evident that true security and identity starts with the human. That was the piece we weren’t yet doing... and that’s when CLEAR came into the picture.”

Eric Jensen
Sr. Director, Cybersecurity, T-Mobile

The Solution

T-Mobile seamlessly integrated CLEAR1 into its employee identity verification and onboarding processes to better ensure that its team members are who they say they are. Through a selfie-based verification approach, T-Mobile is able to verify employees and other team members based on who they are—not just the phones and laptops they use or the passwords and security questions they know.

“As cyber threats grow more complex and bad actors become more sophisticated, further securing T-Mobile starts with knowing exactly who’s behind the screen. CLEAR1 gives us a strong, identity-first approach that helps us build trust across our systems by verifying the person — not just their credentials. It’s a key step in strengthening our identity verification and better protecting our infrastructure, teams and customers.”

- Mark Clancy, SVP, Cybersecurity, T-Mobile

“It became evident that true security and identity starts with the human. That was the piece we weren’t yet doing... and that’s when CLEAR came into the picture.”

Eric Jensen
Sr. Director, Cybersecurity, T-Mobile

Why CLEAR?

CLEAR stood out for its trusted brand and unique approach to identity, built over 15 years operating in the most highly regulated environment (the airport) where nothing can come at the expense of security. 

Because identity is dynamic and multifaceted, CLEAR1 analyzes signals, from biometrics and documents to devices and trusted sources, to verify that employees are who they claim to be. By cross-checking submitted identity data against authoritative third-party databases, CLEAR1 adds an extra layer of source corroboration that strengthens identity assurance.

CLEAR1 also delivers a seamless employee experience by making verification fast and simple. Team members complete a quick, one-time setup that involves uploading a valid government-issued ID and taking a selfie. These are matched to create a unique, reusable identity—meaning future verifications are as easy as snapping a selfie.

Implementation & Key Milestones

T-Mobile began rolling out CLEAR1 during National Cybersecurity Awareness Month, aligning internal education with the company’s broader shift toward becoming passwordless.  

Implementation was a true partnership between both teams, from technical integration to employee education and support.

“It became evident that true security and identity starts with the human. That was the piece we weren’t yet doing... and that’s when CLEAR came into the picture.”
Eric Jensen
Sr. Director, Cybersecurity, T-Mobile
“Implementing CLEAR at this scale was true co-creation. CLEAR was with us every step of the way.”

- Matt Miller, Principal, Cybersecurity, T-Mobile

The Big Picture

The line between real and fake is blurrier than ever. Deepfakes, synthetic identities, and credential-based attacks underscore the need to evolve beyond traditional authentication approaches. Defending against these risks requires more than stronger credentials—it requires confidence in the person behind the device.

1 Sources: U.S. Department of Justice (2022), Benzinga (2025)
Maximize security, minimize friction with CLEAR

Reach out to uncover what problems you can solve when you solve for identity.

Thank you! Your submission has been received. Someone from our team will be in touch shortly.
Oops! Something went wrong while submitting the form.
case study
By submitting my personal data, I consent to CLEAR collecting, processing, and storing my information in accordance with the CLEAR Privacy Notice.
Oops! Something went wrong while submitting the form.

More whitepapers

VIEW ALL WHITEPAPERS
No items found.
case study
By submitting my personal data, I consent to CLEAR collecting, processing, and storing my information in accordance with the CLEAR Privacy Notice.
Thank you! You are being redirected
Oops! Something went wrong while submitting the form.
case study

Beyond the Device: How T-Mobile and CLEAR Are Enhancing Secure Authentication

June 11, 2025