Insights

Passwordless Authentication

Passwordless Authentication solutions should provide a consistent login experience across all devices, introduce a frictionless user experience, include an integrated authentication approach, and ensure that no passwords or password hashes are traveling over the network.

Guide
Guide
Passwordless Authentication: Your Guide to a Passwordless Journey
A definitive guide to passwordless authentication for enterprises to secure their business. An infotainment deep dive into authentication, from what passwordless authentication really means, to the...
Learn more
KC Open Select
KC Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
This Is Why We Can’t Have Nice Things
I had no intention to write any blog posts during the holidays or, God forbid, do any predictions for the next year (look how relevant last year’s predictions turned out to be). However, an...
Learn more
Executive View
Executive View
Beyond Identity Secure Work
Secure Work is a passwordless authentication solution that aims to enable zero trust and enforce device trust (i.e., ensuring the trustworthiness of a device for being authorized to access...
Learn more
Webinar Recording
Webinar Recording
Making Passwordless Authentication a Reality: The Hitchhiker’s Guide
In this webinar, Bojan Simic, founder and CEO at HYPR, and Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, share their insights and experience on what to consider when moving...
Learn more
Revision of the Payment Services Directive (PSD2) - A significant set of new requirements for financial institutions
Blog
Revision of the Payment Services Directive (PSD2) - A significant set of new requirements for financial institutions
The European Commission´s revision of the Payment Services Directive (PSD2) is coming along with a significant set of new requirements for financial institutions with and without a banking...
GlobalPlatform Conference Review
Blog
GlobalPlatform Conference Review
GlobalPlatform recently held their annual conference in Santa Clara, California. GlobalPlatform is an international standards organization that defines specifications for the Trusted Execution...
Not So Dead Yet: Why Passwords Will Survive All of Us
Blog
Not So Dead Yet: Why Passwords Will Survive All of Us
There is probably no single thing in Information Security that has been claimed being dead as frequent as the password. Unfortunately, it isn’t yet dead and far from dying. Far from it! The...
Authentication: Multi-Factor, Adaptive and Continuous
Blog
Authentication: Multi-Factor, Adaptive and Continuous
In the 35 years we’ve had personal computers, tablets and smartphones, authentication has meant a username and password (or Personal Identification Number, PIN) for most people. Yet other...
Free MFA on Windows for the masses
Blog
Free MFA on Windows for the masses
Cion Systems , a US-based IAM (Identity and Access Management) vendor, recently released a free service that allows Windows users to implement  two-factor authentication. It works only for...
Why we need adaptive authentication everywhere - not just in eBanking
Blog
Why we need adaptive authentication everywhere - not just in eBanking
Most probably the first thing that comes to your mind, when being asked about what should be highly secure when being done online is electronic banking. Your account data, your credit card...
Adaptive authentication explained
Blog
Adaptive authentication explained
To understand what this article is about it’s important that we have an agreement on what we mean when we use the term “adaptive authentication”. It isn’t a difficult...
Why Distributed Public Ledgers such as Blockchain will not solve the identification and thus the authentication problem
Blog
Why Distributed Public Ledgers such as Blockchain will not solve the identification and thus the authentication problem
There is a lot of talk about Blockchain and, more generally, Distributed Public Ledgers (DPLs) these days. Some try to position DPLs as a means for better identification and, in consequence,...
Windows 10: Finally - Stronger Authentication
Blog
Windows 10: Finally - Stronger Authentication
Windows 10 comes with the promise of changing computing from ground up. While this might be marketing speak in many aspects that might be true for one central aspect of daily computing life:...
Windows 10 will support FIDO standards for strong authentication
Blog
Windows 10 will support FIDO standards for strong authentication
At KuppingerCole, we have been following the progress of FIDO alliance for quite some time . Since their specifications for scalable and interoperable strong authentication have been published...
Adaptive Policy-based Access Management (APAM): The Future of Authentication and Authorization
Blog
Adaptive Policy-based Access Management (APAM): The Future of Authentication and Authorization
It’s not RBAC vs. ABAC – it’s APAM. Over the past several years, there have been a lot of discussions around terms such as RBAC (Role Based Access Control), ABAC (Attribute Based Access...
FIDO Alliance announces final FIDO 1.0 specifications
Blog
FIDO Alliance announces final FIDO 1.0 specifications
Yesterday, culminating over 20 months of hard work, FIDO Alliance has published final 1.0 drafts of their Universal Authentication Framework (UAF) and Universal 2 nd Factor (U2F)...