Insights

Passwordless Authentication

Passwordless Authentication solutions should provide a consistent login experience across all devices, introduce a frictionless user experience, include an integrated authentication approach, and ensure that no passwords or password hashes are traveling over the network.

Guide
Guide
Passwordless Authentication: Your Guide to a Passwordless Journey
A definitive guide to passwordless authentication for enterprises to secure their business. An infotainment deep dive into authentication, from what passwordless authentication really means, to the...
Learn more
KC Open Select
KC Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
High Assurance MFA Options for Mobile Devices
In recent years much of the focus in the authentication space has been on MFA, mobile devices, and biometrics. Many technical advances have been made which also serve to increase usability and...
Learn more
Leadership Compass
Leadership Compass
Providers of Verified Identity 2022
This Leadership Compass provides an overview up-to-date insights on the leaders in innovation, product features, and market reach for full-services Providers of Verified Identity. These vendors...
Learn more
Webinar Recording
Webinar Recording
Eliminate Passwords With Invisible Multi-Factor Authentication
A high proportion of data breaches and ransomware attacks exploit stolen credentials. Eliminating passwords with multifactor authentication is an effective way to reduce the risk of unauthorized...
Learn more
Prepare for PSD2 with Strong Customer Authentication, Fraud Risk Management and Open Banking APIs
Webinar Recording
Prepare for PSD2 with Strong Customer Authentication, Fraud Risk Management and Open Banking APIs
Banks will soon have to comply with the Revised Payment Service Directive, commonly called "PSD2." The directive will introduce massive changes to the payments industry and radically alter the...
Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture
Webinar Recording
Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture
The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has...
Authentication & Authorization for the Microservices World
Webinar Recording
Authentication & Authorization for the Microservices World
Microservices architectures, where applications comprise multiple loosely coupled components, which can be developed using different languages frameworks, and platforms, have become one of the...
Denis Joannides - Empowering the Digital Insurers
Event Recording
Denis Joannides - Empowering the Digital Insurers
In this session Denis explains how insurance companies such as Unive, AEGON, VGZ and many others leverage Consumer IAM (CIAM) and a secure API Architecture for Mobile Apps to actually transform to...
Beyond Usernames and Passwords: 3 Steps to Modern Authentication
Webinar Recording
Beyond Usernames and Passwords: 3 Steps to Modern Authentication
Adaptive Authentication tailors to what the users want (convenience) and prefer to use (mobile) – all the while adapting appropriately to access risk (smart), by balancing authentication...
Securing and Proving your Digital Self
Webinar Recording
Securing and Proving your Digital Self
No matter what, in the online world, reliable identities are a must for legally valid transactions. There are several technologies available on the market that enable next to unfailing...
Managing Risk through Cloud App Authentication and 360° Control
Webinar Recording
Managing Risk through Cloud App Authentication and 360° Control
The easy availability of IT services delivered as cloud services together with the revolution in the range of devices that are used to access these services has created challenges for organizations...
No Real Security Without Multi-Factor Authentication Everywhere
Webinar Recording
No Real Security Without Multi-Factor Authentication Everywhere
Clearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. The benefits fall largely under the categories of an improved customer experience,...
Authentication, Access, Assets: The Triple A of Securing Sensitive Systems and Information
Webinar Recording
Authentication, Access, Assets: The Triple A of Securing Sensitive Systems and Information
In more than two thirds of all cyber breaches, a misused privileged account serves as the entrance gate. Historically, managing privileged access focused on protecting privileged accounts by...
The Future of Authentication - Killing the Password
Event Recording
The Future of Authentication - Killing the Password
We all understand that the concept of username/password to control access is insecure and out of date in a world where anything is connected and a new approach is needed. But how can we make the...
The Future of Mobile Authentication: Strong, Adaptive, Intelligent
Webinar Recording
The Future of Mobile Authentication: Strong, Adaptive, Intelligent
The unstoppable march of cloud, mobile and social computing in the recent years has made a profound impact on our society. Exponential growth of corporate digital assets combined with the...
Customer-centric Identity Management
Webinar Recording
Customer-centric Identity Management
While most organizations are at least good enough in managing their employee identities, dealing with millions of consumer and customer identities imposes a new challenge. Many new identity types,...