Insights

Passwordless Authentication

Passwordless Authentication solutions should provide a consistent login experience across all devices, introduce a frictionless user experience, include an integrated authentication approach, and ensure that no passwords or password hashes are traveling over the network.

Guide
Guide
Passwordless Authentication: Your Guide to a Passwordless Journey
A definitive guide to passwordless authentication for enterprises to secure their business. An infotainment deep dive into authentication, from what passwordless authentication really means, to the...
Learn more
KC Open Select
KC Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Webinar
Webinar
Modern IAM builds on Policy Based Access
In this webinar, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the status and future of PBAM and the various types of solutions that are available in the market. He...
Learn more
Blog
Blog
Top 3 EIC Topics Picked by Martin Kuppinger
We sat down with KuppingerCole co-founder and principal analyst Martin Kuppinger to ask him about the top three topics that have gained importance since last year’s European Identity and Cloud...
Learn more
Leadership Compass
Leadership Compass
Passwordless Authentication
This report provides an overview of the market for Passwordless Authentication products and services and presents you with a compass to help you to find the Passwordless Authentication product or...
Learn more
Webinar Recording
Webinar Recording
Shut the Door to Cyber Attackers Permanently
Join security experts from KuppingerCole Analysts and Beyond Identity as they discuss the challenges of first-generation MFA and how to reduce friction while increasing security and improving the...
Learn more
Revision of the Payment Services Directive (PSD2) - A significant set of new requirements for financial institutions
Blog
Revision of the Payment Services Directive (PSD2) - A significant set of new requirements for financial institutions
The European Commission´s revision of the Payment Services Directive (PSD2) is coming along with a significant set of new requirements for financial institutions with and without a banking...
GlobalPlatform Conference Review
Blog
GlobalPlatform Conference Review
GlobalPlatform recently held their annual conference in Santa Clara, California. GlobalPlatform is an international standards organization that defines specifications for the Trusted Execution...
Not So Dead Yet: Why Passwords Will Survive All of Us
Blog
Not So Dead Yet: Why Passwords Will Survive All of Us
There is probably no single thing in Information Security that has been claimed being dead as frequent as the password. Unfortunately, it isn’t yet dead and far from dying. Far from it! The...
Authentication: Multi-Factor, Adaptive and Continuous
Blog
Authentication: Multi-Factor, Adaptive and Continuous
In the 35 years we’ve had personal computers, tablets and smartphones, authentication has meant a username and password (or Personal Identification Number, PIN) for most people. Yet other...
Free MFA on Windows for the masses
Blog
Free MFA on Windows for the masses
Cion Systems , a US-based IAM (Identity and Access Management) vendor, recently released a free service that allows Windows users to implement  two-factor authentication. It works only for...
Why we need adaptive authentication everywhere - not just in eBanking
Blog
Why we need adaptive authentication everywhere - not just in eBanking
Most probably the first thing that comes to your mind, when being asked about what should be highly secure when being done online is electronic banking. Your account data, your credit card...
Adaptive authentication explained
Blog
Adaptive authentication explained
To understand what this article is about it’s important that we have an agreement on what we mean when we use the term “adaptive authentication”. It isn’t a difficult...
Why Distributed Public Ledgers such as Blockchain will not solve the identification and thus the authentication problem
Blog
Why Distributed Public Ledgers such as Blockchain will not solve the identification and thus the authentication problem
There is a lot of talk about Blockchain and, more generally, Distributed Public Ledgers (DPLs) these days. Some try to position DPLs as a means for better identification and, in consequence,...
Windows 10: Finally - Stronger Authentication
Blog
Windows 10: Finally - Stronger Authentication
Windows 10 comes with the promise of changing computing from ground up. While this might be marketing speak in many aspects that might be true for one central aspect of daily computing life:...
Windows 10 will support FIDO standards for strong authentication
Blog
Windows 10 will support FIDO standards for strong authentication
At KuppingerCole, we have been following the progress of FIDO alliance for quite some time . Since their specifications for scalable and interoperable strong authentication have been published...
Adaptive Policy-based Access Management (APAM): The Future of Authentication and Authorization
Blog
Adaptive Policy-based Access Management (APAM): The Future of Authentication and Authorization
It’s not RBAC vs. ABAC – it’s APAM. Over the past several years, there have been a lot of discussions around terms such as RBAC (Role Based Access Control), ABAC (Attribute Based Access...
FIDO Alliance announces final FIDO 1.0 specifications
Blog
FIDO Alliance announces final FIDO 1.0 specifications
Yesterday, culminating over 20 months of hard work, FIDO Alliance has published final 1.0 drafts of their Universal Authentication Framework (UAF) and Universal 2 nd Factor (U2F)...