Insights

Passwordless Authentication

Passwordless Authentication solutions should provide a consistent login experience across all devices, introduce a frictionless user experience, include an integrated authentication approach, and ensure that no passwords or password hashes are traveling over the network.

Guide
Guide
Passwordless Authentication: Your Guide to a Passwordless Journey
A definitive guide to passwordless authentication for enterprises to secure their business. An infotainment deep dive into authentication, from what passwordless authentication really means, to the...
Learn more
KC Open Select
KC Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Webinar
Webinar
Modern IAM builds on Policy Based Access
In this webinar, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the status and future of PBAM and the various types of solutions that are available in the market. He...
Learn more
Blog
Blog
Top 5 Work from Home Cybersecurity Recommendations for Enterprises
As the business world moves to rapidly enable work-from-home (WFH), enterprise IT teams need to shift resources and priorities to ensure that remote workers are protected. Already we see malicious...
Learn more
Leadership Compass
Leadership Compass
Passwordless Authentication
This report provides an overview of the market for Passwordless Authentication products and services and presents you with a compass to help you to find the Passwordless Authentication product or...
Learn more
Event Recording
Event Recording
Why Policy-Based Authorization is Critical for Identity First Security
The enterprise perimeter is now its data objects, APIs, applications, and its users are now the workforce, customers, partners and in many cases, machines. In this new, decentralized, and highly...
Learn more
Analyst Chat #153: Passwordless and Biometrics - Balancing UX with Security and Privacy
Analyst Chat
Analyst Chat #153: Passwordless and Biometrics - Balancing UX with Security and Privacy
Alejandro and Matthias continue their conversation about passwordless authentication. This time, the topic is the use of biometrics (and possible security and privacy concerns related to their...
Making Passwordless Authentication a Reality: The Hitchhiker’s Guide
Webinar Recording
Making Passwordless Authentication a Reality: The Hitchhiker’s Guide
In this webinar, Bojan Simic, founder and CEO at HYPR, and Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, share their insights and experience on what to consider when moving...
Analyst Chat #148: How to Improve Security with Passwordless Authentication
Analyst Chat
Analyst Chat #148: How to Improve Security with Passwordless Authentication
"Passwordless authentication" has become a popular and catchy term recently. It comes with the promise of getting rid of the risk associated with passwords, however, organizations will add a...
Better Business With Smooth and Secure Onboarding Processes
Webinar Recording
Better Business With Smooth and Secure Onboarding Processes
In the modern world of working, organizations need to digitally verify and secure identities at scale. But traditional IAM and CIAM strategies can’t identity-proof people in a meaningful way...
Why Architects Should Rethink Authorizations
Webinar Recording
Why Architects Should Rethink Authorizations
In the digital era, organizations are increasingly interacting online with contractors, partners, and customers. Traditional role-based authorization frameworks are not designed to provide these...
Fixing the Way the World Logs In
Webinar Recording
Fixing the Way the World Logs In
Passwords are quickly and easily compromised, they are costly and difficult to manage, and they result in poor user experiences. Many organizations are looking for alternatives, but find it...
Analyst Chat #121: Increasing the Adoption of MFA and Risk-based Authentication
Analyst Chat
Analyst Chat #121: Increasing the Adoption of MFA and Risk-based Authentication
A recently published study shows that the use of strong authentication in enterprise environments is at a very low level. John Tolbert explains this finding to Matthias and together they discuss...
Eliminate Passwords With Invisible Multi-Factor Authentication
Webinar Recording
Eliminate Passwords With Invisible Multi-Factor Authentication
A high proportion of data breaches and ransomware attacks exploit stolen credentials. Eliminating passwords with multifactor authentication is an effective way to reduce the risk of unauthorized...
Prediction #1 - Passwordless Authentication: Killing the Undead will become Mainstream in 2022
Webinar Recording
Prediction #1 - Passwordless Authentication: Killing the Undead will become Mainstream in 2022
The increased importance of a frictionless user experience as a digital business success factor on the one side, and a big wave of ransomware and similar attacks with user credentials as a main...
A Customer-First Approach to Identity-Based Authentication
Webinar Recording
A Customer-First Approach to Identity-Based Authentication
Even though passwords can be compromised easily and are generally considered unsafe, they are still ubiquitous in a time when multi-factor authentication and biometrics are easily available....
The Path to Going Passwordless
Webinar Recording
The Path to Going Passwordless
Password-based authentication is no longer fit for purpose. Passwords are costly and difficult to manage, they result in poor user experiences, and they are easily compromised. This has been...
Does Increased Security Still Mean Added Complexity?
Webinar Recording
Does Increased Security Still Mean Added Complexity?
We’re all accessing more goods and services online than we ever thought possible, which has presented a huge opportunity for cyber criminals. Rapid digital transformation has left some...