Insights

Passwordless Authentication

Passwordless Authentication solutions should provide a consistent login experience across all devices, introduce a frictionless user experience, include an integrated authentication approach, and ensure that no passwords or password hashes are traveling over the network.

Guide
Guide
Passwordless Authentication: Your Guide to a Passwordless Journey
A definitive guide to passwordless authentication for enterprises to secure their business. An infotainment deep dive into authentication, from what passwordless authentication really means, to the...
Learn more
KC Open Select
KC Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
Microsoft Adding New Capabilities to Azure Active Directory
Over the past years, Microsoft has spent significant effort to make Azure Active Directory (Azure AD) the central platform for identities in Microsoft environments and beyond. Microsoft now...
Learn more
Executive View
Executive View
HYPR Passwordless and Phishing-resistant Authentication
Die passwortlose Authentifizierung wird zum neuen Standard. Benutzer müssen keine lästigen Passwörter mehr verwenden und die mit Passwörtern verbundenen Sicherheitsrisiken werden umgangen....
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #155: How to Create a Shortlist in 2023
A new year brings along a new service from KuppingerCole Analysts. Our host Matthias sits down with Christie Pugh, Digital Products Manager to discuss KC Open Select, our new interactive...
Learn more
PSD2 in a Europe of Small Principalities
Blog
PSD2 in a Europe of Small Principalities
Europe’s consumers have been promised for some years now that strong customer authentication (SCA) was on its way. And the rules as to when this should be applied in e-commerce are being...
Facebook Breach Leaves Half a Billion Users Hanging on the Line
Blog
Facebook Breach Leaves Half a Billion Users Hanging on the Line
It seems that there is simply no end to a long series of Facebook’s privacy blunders. This time, a security researcher has stumbled upon an unprotected server hosting several huge databases...
Account Takeovers on the Rise
Blog
Account Takeovers on the Rise
Account Takeover (ATO) attacks are on the rise. The  2019  Forter  Fraud Attack Index  shows a 45% increase in this type of attack on consumer identities in...
Passwordless for the Masses
Blog
Passwordless for the Masses
What an interesting coincidence: I’m writing this just after finishing a webinar where we talked about the latest trends in strong authentication and the ways to eliminate passwords within...
Oops, Google Did It Again!
Blog
Oops, Google Did It Again!
Like many people with a long career in IT, I have numerous small computer-related side duties I’m supposed to perform for my less skilled friends and relatives. Among those, I’m...
Making Sense of the Top Cybersecurity Trends
Blog
Making Sense of the Top Cybersecurity Trends
With each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures...
Administrative Security in Security Products
Blog
Administrative Security in Security Products
At KuppingerCole, cybersecurity and identity management product/service analysis are two of our specialties. As one might assume, one of the main functional areas in vendor products we examine...
The Return of Authorization
Blog
The Return of Authorization
Authorization is one of the key concepts and processes involved in security, both in the real world as well as the digital world.  Many formulations of the definition for authorization exist,...
PSD2: Strong Customer Authentication Done Right
Blog
PSD2: Strong Customer Authentication Done Right
The Revised Payment Services Directive (PSD2), an upcoming EC regulation, will have a massive impact on the Finance Industry. While the changes to the business are primarily based on the newly...
GDPR as an Opportunity to Build Trusted Relationships with Consumers
Blog
GDPR as an Opportunity to Build Trusted Relationships with Consumers
During the KuppingerCole webinar run March 16 th , 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack...
PSD2 RTS Final Draft: The good and the not-so-good
Blog
PSD2 RTS Final Draft: The good and the not-so-good
The European Banking Authority released the final draft of the Regulatory Technical Specifications for PSD2 this week.  It contains several improvements and clarifications, but there are...
PSD II, Adaptive Authentication, and Multi-Factor Authentication
Blog
PSD II, Adaptive Authentication, and Multi-Factor Authentication
The upcoming updated Payment Services Directive (PSD II) will, among other changes, request Multi-Factor Authentication (MFA) for all payments above 10€ which aren’t done...