Insights

Passwordless Authentication

Passwordless Authentication solutions should provide a consistent login experience across all devices, introduce a frictionless user experience, include an integrated authentication approach, and ensure that no passwords or password hashes are traveling over the network.

Guide
Guide
Passwordless Authentication: Your Guide to a Passwordless Journey
A definitive guide to passwordless authentication for enterprises to secure their business. An infotainment deep dive into authentication, from what passwordless authentication really means, to the...
Learn more
KC Open Select
KC Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
Multifactor Authentication
The value of multifactor authentication (MFA) is illustrated by a recently published report by Microsoft’s security team about a multi-stage, large-scale phishing campaign that was...
Learn more
Leadership Compass
Leadership Compass
Providers of Verified Identity 2022
This Leadership Compass provides an overview up-to-date insights on the leaders in innovation, product features, and market reach for full-services Providers of Verified Identity. These vendors...
Learn more
Event Recording
Event Recording
FIDO2: The Train is Leaving the Station
The FIDO Alliance is working to change the nature of authentication with open standards that are more secure than passwords, simpler for consumers to use, and easier for service providers to...
Learn more
Remote-Angestellte mit starker Authentifizierung schützen
Webinar Recording
Remote-Angestellte mit starker Authentifizierung schützen
Hacker schlagen Kapital aus Unsicherheit, Angst, Ablenkung, Isolation und Verwirrung. Die Verlagerung auf Remote-Arbeit hat viele dieser Eigenschaften, daher ist es entscheidend, das Vertrauen der...
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Event Recording
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Decentralized Biometrics and Next-Generation Authentication | Frontier Talk #2 - Frances Zelazny
Frontier Talk
Decentralized Biometrics and Next-Generation Authentication | Frontier Talk #2 - Frances Zelazny
Raj Hegde sits down with Frances Zelazny, Co-founder & CEO of Anonybit, to understand the novel concept of decentralized biometrics. Tune in to this exciting episode for a deep dive on...
Techniques for Securing Transactions With Identity Verification and Verifiable Claims
Webinar Recording
Techniques for Securing Transactions With Identity Verification and Verifiable Claims
Consumer and Workforce identities are under assault. Cybercrime and fraud are pervasive problems that have only escalated during the pandemic. Even as the number of online and mobile transactions...
We Need to Talk About Passwords – Urgently!
Webinar Recording
We Need to Talk About Passwords – Urgently!
Passwords have been used for authentication for decades and continue to proliferate. Yet we know they create friction for users, slow down business productivity, and are a weak form of user...
Analyst Chat #29: Getting Rid of the Password
Analyst Chat
Analyst Chat #29: Getting Rid of the Password
Warwick Ashford and Matthias Reinwarth discuss the standards, technologies and organizational changes needed to finally get rid of the password-based authentication once and for all.
Working From Home Is Not Secure Without an Effective IAM
Webinar Recording
Working From Home Is Not Secure Without an Effective IAM
The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many...
Analyst Chat #23: When is a Security Product not a Security Product?
Analyst Chat
Analyst Chat #23: When is a Security Product not a Security Product?
Matthias Reinwarth and John Tolbert talk about profound implications of security products not having their administrative interfaces sufficiently secured with technologies like multi-factor...
Why Adaptive Authentication is the Future
Video
Why Adaptive Authentication is the Future
Martin Kuppinger explains adaptive authentication.
Extending Beyond the Limits of Multi-Factor Authentication With Continuous Adaptive Trust
Webinar Recording
Extending Beyond the Limits of Multi-Factor Authentication With Continuous Adaptive Trust
The Identity and Access Management (IAM) market is undergoing rapid and at times transformative change. A steady progression from on-premises to API and cloud platforms is visible as vendors...
Complying With PSD2: Everything You Need to Know
Webinar Recording
Complying With PSD2: Everything You Need to Know
With the Revised Payment Service Directive (PSD2) coming into full effect this fall, banks and online retailers need to adapt to changes that carry with them many regulatory and technical...
Facilitating Business with State-of-the-Art Identity Proofing Solutions
Webinar Recording
Facilitating Business with State-of-the-Art Identity Proofing Solutions
For traditional or Business-to-Employee (B2E) IAM, HR departments are responsible for gathering documentation from employees to determine their suitability for employment. For Business-to-Consumer...