Insights

Passwordless Authentication

Passwordless Authentication solutions should provide a consistent login experience across all devices, introduce a frictionless user experience, include an integrated authentication approach, and ensure that no passwords or password hashes are traveling over the network.

Guide
Guide
Passwordless Authentication: Your Guide to a Passwordless Journey
A definitive guide to passwordless authentication for enterprises to secure their business. An infotainment deep dive into authentication, from what passwordless authentication really means, to the...
Learn more
KC Open Select
KC Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
Passwordless Authentication
Passwords are inherently insecure , and adding multifactor authentication can help compensate, but ultimately, organizations should be aiming to eliminate the password altogether because strong...
Learn more
Executive View
Executive View
HYPR Passwordless and Phishing-resistant Authentication
Die passwortlose Authentifizierung wird zum neuen Standard. Benutzer müssen keine lästigen Passwörter mehr verwenden und die mit Passwörtern verbundenen Sicherheitsrisiken werden umgangen....
Learn more
Event Recording
Event Recording
FIDO 2: Zero Trust in Action with Passwordless Phishing Resistant Authentication
By now, organizations are well aware of the need for better protecting data and application with modern access management and authentication. Thales and Microsoft partner to help organizations...
Learn more
Passwordless Authentication
Blog
Passwordless Authentication
Passwords are one of the top attack vectors, with a large percentage of cyber attacks enabled through password compromise. Password-based authentication is no longer fit for purpose. Passwords...
A Iot to Venture, More to GAIN
Blog
A Iot to Venture, More to GAIN
As social beings, people interact with their environment, whether as citizens of a state, as employees of a company or as contractual partners (customers, insured persons) with a company in the...
This Is Why We Can’t Have Nice Things
Blog
This Is Why We Can’t Have Nice Things
I had no intention to write any blog posts during the holidays or, God forbid, do any predictions for the next year (look how relevant last year’s predictions turned out to be). However, an...
Putting Your First-Line Worker at the Center of Attention
Blog
Putting Your First-Line Worker at the Center of Attention
Since the beginning of the Covid-19 crisis, the use of language in public life, in the press, and in everyday life has changed. Terms that were formerly confined to the circles directly affected...
Microsoft Adding New Capabilities to Azure Active Directory
Blog
Microsoft Adding New Capabilities to Azure Active Directory
Over the past years, Microsoft has spent significant effort to make Azure Active Directory (Azure AD) the central platform for identities in Microsoft environments and beyond. Microsoft now...
Why Adaptive Authentication is the Future
Blog
Why Adaptive Authentication is the Future
Martin Kuppinger explains adaptive authentication.
Top 5 Work from Home Cybersecurity Recommendations for Enterprises
Blog
Top 5 Work from Home Cybersecurity Recommendations for Enterprises
As the business world moves to rapidly enable work-from-home (WFH), enterprise IT teams need to shift resources and priorities to ensure that remote workers are protected. Already we see malicious...
5G and Identity
Blog
5G and Identity
5G Identity and Authentication 5G is the next generation of cellular mobile communications intended to support the massive increase in capacity and connectivity that will be required for the...
High Assurance MFA Options for Mobile Devices
Blog
High Assurance MFA Options for Mobile Devices
In recent years much of the focus in the authentication space has been on MFA, mobile devices, and biometrics. Many technical advances have been made which also serve to increase usability and...
Authentication and Education High on CISO Agenda
Blog
Authentication and Education High on CISO Agenda
Multifactor authentication and end-user education emerged as the most common themes at a CISO forum with analysts held under Chatham House Rules in London. Chief information security officers...
Nok Nok Labs Extends FIDO-Based Authentication
Blog
Nok Nok Labs Extends FIDO-Based Authentication
Nok Nok Labs has made FIDO certified multi-factor authentication – which seeks to eliminate dependence on password-based security - available across all digital channels by adding a...
Leading IDaaS Supplier OneLogin Aiming for the Top
Blog
Leading IDaaS Supplier OneLogin Aiming for the Top
OneLogin is among the leading vendors in the overall, product, innovation and market leadership ratings in KuppingerCole’s latest Leadership Compass Report on IDaaS Access Management , but...