Insights

Passwordless Authentication

Passwordless Authentication solutions should provide a consistent login experience across all devices, introduce a frictionless user experience, include an integrated authentication approach, and ensure that no passwords or password hashes are traveling over the network.

Guide
Guide
Passwordless Authentication: Your Guide to a Passwordless Journey
A definitive guide to passwordless authentication for enterprises to secure their business. An infotainment deep dive into authentication, from what passwordless authentication really means, to the...
Learn more
KC Open Select
KC Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
Putting Your First-Line Worker at the Center of Attention
Since the beginning of the Covid-19 crisis, the use of language in public life, in the press, and in everyday life has changed. Terms that were formerly confined to the circles directly affected...
Learn more
Whitepaper
Whitepaper
Simplifying and Strengthening Authentication with Passwordless Desktop MFA
If a password is like a house key, the security foundation of an organization's IT systems should have a securely locked front door. Make the front door as secure as possible, and you may as well...
Learn more
Event Recording
Event Recording
What’s Next In Enterprise Authorization
As organizations undergo digital transformation to zero-trust architectures, identity-driven security becomes a critical aspect. Beyond new authentication technologies, organizations must have...
Learn more
The Compelling Case for Risk-Based Adaptive Authentication
Webinar Recording
The Compelling Case for Risk-Based Adaptive Authentication
Consumers and employees are increasingly on-the-go, and that means that more transactions and more work originates from the mobile phone. Fraud and data loss rates have also been rising. A...
Regaining Control With IGA Solutions
Webinar Recording
Regaining Control With IGA Solutions
Role management remains a pivotal challenge in many companies. Regulations (such as BAIT and VAIT in Germany) require companies not only to implement an IGA solution (Identity Governance &...
It’s Time to Forget Your Password and Settle for Multi-Factor Authentication
Webinar Recording
It’s Time to Forget Your Password and Settle for Multi-Factor Authentication
The majority of security breaches and attacks can be traced back to stolen and compromised passwords. Mobile devices are often particularly vulnerable because many users tend to avoid long...
The Passwordless Enterprise: Building A Long-Term Zero Trust Strategy
Webinar Recording
The Passwordless Enterprise: Building A Long-Term Zero Trust Strategy
“The password is dead.” We have heard this statement for at least a decade, yet even in 2019, data breaches based on stolen user credentials continue to dominate the headlines. Why do...
Getting Rid of the Password – How to Increase Safety Affordably
Webinar Recording
Getting Rid of the Password – How to Increase Safety Affordably
Despite compromised passwords being the leading cause of data breaches, most online businesses still rely on solely using passwords for logins. While getting rid of password authentication is...
Secure Login for Highly-Regulated Hybrid Environments: Avoid Being Forced Into the Cloud
Webinar Recording
Secure Login for Highly-Regulated Hybrid Environments: Avoid Being Forced Into the Cloud
The march of the cloud is unstoppable. Eager to outsource the tedious and expensive maintenance of their IT infrastructures to a reliable 3rd party, most companies would dream of becoming...
Mitigate Identity-Related Breaches in the Era of Digital Transformation
Webinar Recording
Mitigate Identity-Related Breaches in the Era of Digital Transformation
Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations...
Solving New Authentication Challenges While Finding Parity Between User Experience and Security
Webinar Recording
Solving New Authentication Challenges While Finding Parity Between User Experience and Security
In an increasingly hostile world, where you don't know who to trust, companies still need to be able to deliver trusted, personalized experiences for users, without making them jump through hoops...
Martin Kuppinger's Top 5 IAM Topics for 2019
Video
Martin Kuppinger's Top 5 IAM Topics for 2019
Where to put your focus on in 2019
An Overview of the Leadership Compass: Adaptive Authentication and Cloud-Based Multi-Factor Authentication
Webinar Recording
An Overview of the Leadership Compass: Adaptive Authentication and Cloud-Based Multi-Factor Authentication
KuppingerCole has published two related Leadership Compasses on Adaptive Authentication and Cloud-based Multi-Factor Authentication solutions. We define adaptive authentication (AA) as the...
Fine-Grained Policy-Based Access Control: Why & How?
Webinar Recording
Fine-Grained Policy-Based Access Control: Why & How?
Mastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Authorization has become a crucial part of security infrastructures...
Making Sense of the Top 5 Latest Cybersecurity Trends
Webinar Recording
Making Sense of the Top 5 Latest Cybersecurity Trends
Let’s face it: with each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of...