Market Overview Strong Authentication

Report Details

For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought this mode of authentication to a point where users and administrators are no longer able to cope with it. Be it the increased level of security, a.k.a. authenticity, required by the service provider, or compliance requirements: other means of authentication are necessary to keep up with future system designs and customer experience expectations. Still, we all suffer from having to remember a multitude of these credentials and now companies are looking for ways out of this password-trap. But what to choose from an ever growing market of clever and appealing authentication solutions? A question not lightly answered in general, as requirements for different applications and services might greatly differ.

Depending on what purpose the new authentication mode shall serve - be it more usability, general applicability in multiple use-cases, higher security or others - several solutions might seem appropriate. Thus, a one-size-fits-all approach to authentication is definitely something not feasible, and so are point-solutions that create high maintenance cost while offering a limited number of application scenarios. Companies must create an elaborate and comprehensive Authentication Strategy, which is tightly aligned with its Security Strategy - which, in turn, needs to be based on the overall Company Strategy. This does not necessarily imply that the details of the Authentication Strategy need to be defined understood or created by executive management. But it certainly does imply that the general path chosen by creating such an Authentication Strategy and the details defined therein are clearly communicated to the executives - and the expected effects each technology may have should be explained as well.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Mar 08, 2010

Market Overview Strong Authentication

For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought…

€695.00 Get Access
Mastercard Visa PayPal Invoice

Latest Related Reports

Executive View

Executive View: Nok Nok Labs S3 Authentication Suite - 71261

Nok Nok Labs S3 Authentication Suite is a unified strong authentication platform that incorporates FIDO Alliance specifications and other industry standards, as well as proprietary innovations. The S3 Authentication Suite provides a full stack of client- and server-side technologies for…

Leadership Brief

Leadership Brief: Mobile Connect - 71518

Strong authentication via smartphones is available today in many countries. GSMA’s Mobile Connect specification can improve security and help banks and third party providers comply with the EU’s Revised Payment Service Directiv e (PSD2).  

Executive View

Executive View: Indeed AirKey Enterprise - 71256

AirKey Enterprise is a software smart card platform that is 100% compatible with existing standards and APIs for traditional smart cards, enabling high security, low cost, and unified management of a hybrid smart card infrastructure.

Executive View

Executive View: Auth0 Authentication Service - 71325

A perennial problem for programmers is the need to authenticate users. In some cases, there is no infrastructure to support access control and in many cases there is no single identity repository of user data to be used as an authentication source. In a federated environment there are…

Executive View

Executive View: AdNovum Nevis Security Suite - 71094

A solution for managing secure access to corporate resources and protected assets. Strong authentication, a broad spectrum of access management methods, sustainable maintenance processes of identities and authorization data form the basis for secure and auditable user access to applications.

Executive View

Executive View: PointSharp Mobile Gateway - 71508

PointSharp Mobile Gateway is an enterprise mobility solution that provides strong authentication and easy, yet secure, mobile access to Microsoft Exchange and Skype for Business, both on-premise and in the cloud.  

Executive View

Executive View: LSE LinOTP - 71452

LSE LinOTP is a standards-based, open source solution that provides token and SMS-based Multi-Factor Authentication by integrating with existing authentication challenge schemes. LinOTP provides strong authentication to hosted web and mobile applications, as well as non-web based protected…

Executive View

Executive View: YubiKey by Yubico - 70842

YubiKey is a hardware authentication device that provides two-factor authentication using either one-time passwords or public key infrastructures. Combining strong cryptography with ease of use and supporting a wide range of authentication methods and protocols, YubiKeys are widely deployed…

Executive View

Executive View: FIDO Alliance - 71504

The FIDO® (Fast IDentity Online) Alliance is a non-profit organization with a mission to change the nature of online authentication.

Vendor Report

Vendor Report: AlertEnterprise - 71048

Integrating IT security, physical access security and Operational Technology security into one convergent solution concept.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Latest Insights

Hot Topics

Spotlight

Learn more

Connected Consumer

When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organisation the consumer typically does this with two contrasting expectations. On one hand the consumer wants to benefit from the organisation as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00