Advisory Note: Strong Authentication - 70261

Report Details

This research note provides a comprehensive overview about authentication technologies available today. Strong authentication is a challenge for most organizations. However, selecting the appropriate strong authentication mechanism(s) is a difficult decision. This research note provides criteria for selecting the mechanism or combination of mechanisms which fits best to the different use cases like internal users accessing highly sensitive information or external users doing small financial transactions.

The research note analyzes authentication mechanisms based on several criteria, including:

• Authentication strength
• Logistics
• Mobile support
• Usability
• Reusability
• Support for specific privacy requirements

Based on that information, customers can more easily rate the authentication mechanisms they are looking at. Selecting the right combination still is a complex task, because requirements and use case are pretty different across organizations. KuppingerCole recommends not to look at a single technology but at a combination of technologies, supported by versatile authentication platforms.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jun 09, 2011

Advisory Note: Strong Authentication - 70261

This research note provides a comprehensive overview about authentication technologies available today. Strong authentication is a challenge for most organizations. However, selecting the appropriate strong authentication mechanism(s) is a difficult decision. This research note provides…

€195.00
excl. VAT
Unavailable
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Executive View

HID Global Authentication Platform

In recent years, investment into cybersecurity has soared but, in most cases, these efforts have not fully addressed the reliance on passwords and the challenges they introduce. Without secure access to resources, businesses and organizations are at risk of suffering from phishing and social enginee

Leadership Compass

Passwordless Authentication

This report provides an overview of the market for Passwordless Authentication products and services and presents you with a compass to help you to find the Passwordless Authentication product or service that best meets your customers, partners, or workforce needs. We examine the market…

Whitepaper

Einfachere und stärkere Authentifizierung mit passwortloser Desktop-MFA

Wenn ein Passwort wie ein Hausschlüssel ist, dann sollte die Grundlage der Sicherheit der IT-Systeme eines Unternehmens eine sicher verschlossene Eingangstür sein. Wenn die Eingangstür bestmöglich gesichert ist, dann brauchen Sie vielleicht nie wieder Schlüssel für weitere Türen. Durch die…

Whitepaper

Customer authentication with zero-friction passwordless authentication

To increase security and convenience, businesses and organizations need to adopt and implement a modern authentication system that does not rely on customers remembering usernames and passwords. Beyond Identity's newest product, Secure Customers, is a secure and frictionless authentication…

Executive View

Beyond Identity Secure Customers

Password authentication is not only insecure, but it leads to poor consumer experiences and is costly for organizations to maintain. As far as customer authentication is concerned, there are three main problems: friction, security, and legacy MFA solutions. Beyond Identity's Secure Customers…

Executive View

HYPR Passwordless and Phishing-resistant Authentication

Die passwortlose Authentifizierung wird zum neuen Standard. Benutzer müssen keine lästigen Passwörter mehr verwenden und die mit Passwörtern verbundenen Sicherheitsrisiken werden umgangen. Innerhalb der großen Auswahl an Lösungen, die für sich in Anspruch nehmen, ohne Kennwörter zu arbeiten,…

Whitepaper

Simplifying and Strengthening Authentication with Passwordless Desktop MFA

If a password is like a house key, the security foundation of an organization's IT systems should have a securely locked front door. Make the front door as secure as possible, and you may as well never need a house key again. By implementing more complex passwords, organizations end up…

Whitepaper

The Future is Passwordless. If you do it right.

Passwordless authentication has become a popular topic. Given the security risks and inconvenience of using passwords, many organizations are looking to completely eliminate and replace passwords with more secure authentication methods. As credential theft and ransomware attacks continue to…

Executive View

HYPR Passwordless and Phishing-resistant Authentication

Passwordless authentication is becoming the new normal, bypassing the need for users to maintain passwords, and thus bypassing the inherent security challenges of passwords. In the broad range of solutions that claim being passwordless, HYPR excels with its desktop and Microsoft Active…

Executive View

NRI SecureTechnologies Uni-ID Libra 2.6

Consumer Identity and Access Management (CIAM) continues to be a growing market, offering a better user experience for the consumer and new challenges for the organization. Focusing on the Japanese market, the updated NRI Secure's Uni-ID Libra v2.6 continues to provide innovative features…