Insights

Passwordless Authentication

Passwordless Authentication solutions should provide a consistent login experience across all devices, introduce a frictionless user experience, include an integrated authentication approach, and ensure that no passwords or password hashes are traveling over the network.

Guide
Guide
Passwordless Authentication: Your Guide to a Passwordless Journey
A definitive guide to passwordless authentication for enterprises to secure their business. An infotainment deep dive into authentication, from what passwordless authentication really means, to the...
Learn more
KC Open Select
KC Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Webinar
Webinar
Modern IAM builds on Policy Based Access
In this webinar, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the status and future of PBAM and the various types of solutions that are available in the market. He...
Learn more
Blog
Blog
Curse and Blessing of Biometric Authentication
Technology in itself is neither moral nor immoral, is it? It depends on how it is used. We need to have a discussion about how we move forward. Watch the interview with Mike to learn more about his...
Learn more
Whitepaper
Whitepaper
Simplifying and Strengthening Authentication with Passwordless Desktop MFA
If a password is like a house key, the security foundation of an organization's IT systems should have a securely locked front door. Make the front door as secure as possible, and you may as well...
Learn more
Event Recording
Event Recording
Enforcing Decentralized Authorization in a Multi-Platform API Landscape at Scale
Authorization (AuthZ) and Authentication (AuthN) go hand in hand in ensuring zero-trust in your system landscape. But while scaling identity can be done by centralizing it in an IAM solution,...
Learn more
Passwordless Authentication
Blog
Passwordless Authentication
Passwords are one of the top attack vectors, with a large percentage of cyber attacks enabled through password compromise. Password-based authentication is no longer fit for purpose. Passwords...
A Iot to Venture, More to GAIN
Blog
A Iot to Venture, More to GAIN
As social beings, people interact with their environment, whether as citizens of a state, as employees of a company or as contractual partners (customers, insured persons) with a company in the...
This Is Why We Can’t Have Nice Things
Blog
This Is Why We Can’t Have Nice Things
I had no intention to write any blog posts during the holidays or, God forbid, do any predictions for the next year (look how relevant last year’s predictions turned out to be). However, an...
Putting Your First-Line Worker at the Center of Attention
Blog
Putting Your First-Line Worker at the Center of Attention
Since the beginning of the Covid-19 crisis, the use of language in public life, in the press, and in everyday life has changed. Terms that were formerly confined to the circles directly affected...
Microsoft Adding New Capabilities to Azure Active Directory
Blog
Microsoft Adding New Capabilities to Azure Active Directory
Over the past years, Microsoft has spent significant effort to make Azure Active Directory (Azure AD) the central platform for identities in Microsoft environments and beyond. Microsoft now...
Why Adaptive Authentication is the Future
Blog
Why Adaptive Authentication is the Future
Martin Kuppinger explains adaptive authentication.
Top 5 Work from Home Cybersecurity Recommendations for Enterprises
Blog
Top 5 Work from Home Cybersecurity Recommendations for Enterprises
As the business world moves to rapidly enable work-from-home (WFH), enterprise IT teams need to shift resources and priorities to ensure that remote workers are protected. Already we see malicious...
5G and Identity
Blog
5G and Identity
5G Identity and Authentication 5G is the next generation of cellular mobile communications intended to support the massive increase in capacity and connectivity that will be required for the...
High Assurance MFA Options for Mobile Devices
Blog
High Assurance MFA Options for Mobile Devices
In recent years much of the focus in the authentication space has been on MFA, mobile devices, and biometrics. Many technical advances have been made which also serve to increase usability and...
Authentication and Education High on CISO Agenda
Blog
Authentication and Education High on CISO Agenda
Multifactor authentication and end-user education emerged as the most common themes at a CISO forum with analysts held under Chatham House Rules in London. Chief information security officers...
Nok Nok Labs Extends FIDO-Based Authentication
Blog
Nok Nok Labs Extends FIDO-Based Authentication
Nok Nok Labs has made FIDO certified multi-factor authentication – which seeks to eliminate dependence on password-based security - available across all digital channels by adding a...
Leading IDaaS Supplier OneLogin Aiming for the Top
Blog
Leading IDaaS Supplier OneLogin Aiming for the Top
OneLogin is among the leading vendors in the overall, product, innovation and market leadership ratings in KuppingerCole’s latest Leadership Compass Report on IDaaS Access Management , but...