Insights

Passwordless Authentication

Passwordless Authentication solutions should provide a consistent login experience across all devices, introduce a frictionless user experience, include an integrated authentication approach, and ensure that no passwords or password hashes are traveling over the network.

Guide
Guide
Passwordless Authentication: Your Guide to a Passwordless Journey
A definitive guide to passwordless authentication for enterprises to secure their business. An infotainment deep dive into authentication, from what passwordless authentication really means, to the...
Learn more
KC Open Select
KC Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
Going Passwordless – Separating Identity and Authentication
Before starting any passwordless authentication journey, understanding the difference between identity and authentication is an important step. Alejandro Leal takes you on an exploration of the...
Learn more
Leadership Compass
Leadership Compass
Providers of Verified Identity 2022
This Leadership Compass provides an overview up-to-date insights on the leaders in innovation, product features, and market reach for full-services Providers of Verified Identity. These vendors...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #153: Passwordless and Biometrics - Balancing UX with Security and Privacy
Alejandro and Matthias continue their conversation about passwordless authentication. This time, the topic is the use of biometrics (and possible security and privacy concerns related to their...
Learn more
Regaining Control With IGA Solutions
Webinar Recording
Regaining Control With IGA Solutions
Role management remains a pivotal challenge in many companies. Regulations (such as BAIT and VAIT in Germany) require companies not only to implement an IGA solution (Identity Governance &...
Facebook Breach Leaves Half a Billion Users Hanging on the Line
Blog
Facebook Breach Leaves Half a Billion Users Hanging on the Line
It seems that there is simply no end to a long series of Facebook’s privacy blunders. This time, a security researcher has stumbled upon an unprotected server hosting several huge databases...
It’s Time to Forget Your Password and Settle for Multi-Factor Authentication
Webinar Recording
It’s Time to Forget Your Password and Settle for Multi-Factor Authentication
The majority of security breaches and attacks can be traced back to stolen and compromised passwords. Mobile devices are often particularly vulnerable because many users tend to avoid long...
Account Takeovers on the Rise
Blog
Account Takeovers on the Rise
Account Takeover (ATO) attacks are on the rise. The  2019  Forter  Fraud Attack Index  shows a 45% increase in this type of attack on consumer identities in...
Passwordless for the Masses
Blog
Passwordless for the Masses
What an interesting coincidence: I’m writing this just after finishing a webinar where we talked about the latest trends in strong authentication and the ways to eliminate passwords within...
The Passwordless Enterprise: Building A Long-Term Zero Trust Strategy
Webinar Recording
The Passwordless Enterprise: Building A Long-Term Zero Trust Strategy
“The password is dead.” We have heard this statement for at least a decade, yet even in 2019, data breaches based on stolen user credentials continue to dominate the headlines. Why do...
Getting Rid of the Password – How to Increase Safety Affordably
Webinar Recording
Getting Rid of the Password – How to Increase Safety Affordably
Despite compromised passwords being the leading cause of data breaches, most online businesses still rely on solely using passwords for logins. While getting rid of password authentication is...
Oops, Google Did It Again!
Blog
Oops, Google Did It Again!
Like many people with a long career in IT, I have numerous small computer-related side duties I’m supposed to perform for my less skilled friends and relatives. Among those, I’m...
Secure Login for Highly-Regulated Hybrid Environments: Avoid Being Forced Into the Cloud
Webinar Recording
Secure Login for Highly-Regulated Hybrid Environments: Avoid Being Forced Into the Cloud
The march of the cloud is unstoppable. Eager to outsource the tedious and expensive maintenance of their IT infrastructures to a reliable 3rd party, most companies would dream of becoming...
Mitigate Identity-Related Breaches in the Era of Digital Transformation
Webinar Recording
Mitigate Identity-Related Breaches in the Era of Digital Transformation
Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations...
Solving New Authentication Challenges While Finding Parity Between User Experience and Security
Webinar Recording
Solving New Authentication Challenges While Finding Parity Between User Experience and Security
In an increasingly hostile world, where you don't know who to trust, companies still need to be able to deliver trusted, personalized experiences for users, without making them jump through hoops...
Martin Kuppinger's Top 5 IAM Topics for 2019
Video
Martin Kuppinger's Top 5 IAM Topics for 2019
Where to put your focus on in 2019
Previous
8 9 10 11 12 13 14 Next