KuppingerCole Identifies Leaders in Consumer Authentication
- LANGUAGE: English DATE: Wednesday, November 06, 2019 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Password-based authentication is insecure, leads to a poor customer experience, and is costly for businesses to maintain. Knowledge-based authentication, often used for password resets, is even more insecure given that the answers to individuals’ security questions are often found online. Consumer-facing online businesses are looking for stronger authentication options to reduce the risk of fraud and provide more pleasant user experiences.
Organizations are adopting Consumer Identity and Access Management (CIAM) solutions or enhancing their existing customer-facing IAM solutions with modular authentication services, in order to deter fraud, comply with new regional and industry-specific regulations, and improve the customer experience. Most organizations have IAM products in place already for business-to-employee use cases. However, many are finding that their current solutions are not able to meet consumer expectations or security requirements.
In this KuppingerCole webinar you will:
- Learn why older and weaker authentication methods are not sufficient anymore
- Find out how customer experience is affected by CIAM solutions
- Get insights on the variety of authentication solutions, their advantages and shortcomings
- See how the vendors compare
KuppingerCole Lead Analyst John Tolbert will discuss the methodology, research, and results of the Leadership Compass on Consumers Authentication. Picking the right solution for your enterprise always requires a thorough analysis of customer requirements and a comparison of available products and services.
Leadership Compass: Consumer Authentication - 80061
This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication product or service that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing Consumer Authentication solutions.
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.