Insights

Passwordless Authentication

Passwordless Authentication solutions should provide a consistent login experience across all devices, introduce a frictionless user experience, include an integrated authentication approach, and ensure that no passwords or password hashes are traveling over the network.

Guide
Guide
Passwordless Authentication: Your Guide to a Passwordless Journey
A definitive guide to passwordless authentication for enterprises to secure their business. An infotainment deep dive into authentication, from what passwordless authentication really means, to the...
Learn more
KC Open Select
KC Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
A Iot to Venture, More to GAIN
As social beings, people interact with their environment, whether as citizens of a state, as employees of a company or as contractual partners (customers, insured persons) with a company in the...
Learn more
Executive View
Executive View
Beyond Identity Secure Work
Secure Work is a passwordless authentication solution that aims to enable zero trust and enforce device trust (i.e., ensuring the trustworthiness of a device for being authorized to access...
Learn more
Webinar Recording
Webinar Recording
Working From Home Is Not Secure Without an Effective IAM
The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many...
Learn more
An Overview of the Leadership Compass: Adaptive Authentication and Cloud-Based Multi-Factor Authentication
Webinar Recording
An Overview of the Leadership Compass: Adaptive Authentication and Cloud-Based Multi-Factor Authentication
KuppingerCole has published two related Leadership Compasses on Adaptive Authentication and Cloud-based Multi-Factor Authentication solutions. We define adaptive authentication (AA) as the...
Fine-Grained Policy-Based Access Control: Why & How?
Webinar Recording
Fine-Grained Policy-Based Access Control: Why & How?
Mastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Authorization has become a crucial part of security infrastructures...
Making Sense of the Top Cybersecurity Trends
Blog
Making Sense of the Top Cybersecurity Trends
With each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures...
Making Sense of the Top 5 Latest Cybersecurity Trends
Webinar Recording
Making Sense of the Top 5 Latest Cybersecurity Trends
Let’s face it: with each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of...
Prepare for PSD2 with Strong Customer Authentication, Fraud Risk Management and Open Banking APIs
Webinar Recording
Prepare for PSD2 with Strong Customer Authentication, Fraud Risk Management and Open Banking APIs
Banks will soon have to comply with the Revised Payment Service Directive, commonly called "PSD2." The directive will introduce massive changes to the payments industry and radically alter the...
NRI SecureTechnologies: Uni-ID Libra 2.0
Executive View
NRI SecureTechnologies: Uni-ID Libra 2.0
NRI Secure’s Uni-ID Libra is a relatively new entrant in the rapidly growing market for consumer identity management (CIAM). Focused for now completely on the Japanese market, the product...
Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture
Webinar Recording
Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture
The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has...
Authentication & Authorization for the Microservices World
Webinar Recording
Authentication & Authorization for the Microservices World
Microservices architectures, where applications comprise multiple loosely coupled components, which can be developed using different languages frameworks, and platforms, have become one of the...
Administrative Security in Security Products
Blog
Administrative Security in Security Products
At KuppingerCole, cybersecurity and identity management product/service analysis are two of our specialties. As one might assume, one of the main functional areas in vendor products we examine...
The Return of Authorization
Blog
The Return of Authorization
Authorization is one of the key concepts and processes involved in security, both in the real world as well as the digital world.  Many formulations of the definition for authorization exist,...
PSD2: Strong Customer Authentication Done Right
Blog
PSD2: Strong Customer Authentication Done Right
The Revised Payment Services Directive (PSD2), an upcoming EC regulation, will have a massive impact on the Finance Industry. While the changes to the business are primarily based on the newly...
Denis Joannides - Empowering the Digital Insurers
Event Recording
Denis Joannides - Empowering the Digital Insurers
In this session Denis explains how insurance companies such as Unive, AEGON, VGZ and many others leverage Consumer IAM (CIAM) and a secure API Architecture for Mobile Apps to actually transform to...
Previous
9 10 11 12 13 14 15 Next