Market Overview Strong Authentication

Report Details

For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought this mode of authentication to a point where users and administrators are no longer able to cope with it. Be it the increased level of security, a.k.a. authenticity, required by the service provider, or compliance requirements: other means of authentication are necessary to keep up with future system designs and customer experience expectations. Still, we all suffer from having to remember a multitude of these credentials and now companies are looking for ways out of this password-trap. But what to choose from an ever growing market of clever and appealing authentication solutions? A question not lightly answered in general, as requirements for different applications and services might greatly differ.

Depending on what purpose the new authentication mode shall serve - be it more usability, general applicability in multiple use-cases, higher security or others - several solutions might seem appropriate. Thus, a one-size-fits-all approach to authentication is definitely something not feasible, and so are point-solutions that create high maintenance cost while offering a limited number of application scenarios. Companies must create an elaborate and comprehensive Authentication Strategy, which is tightly aligned with its Security Strategy - which, in turn, needs to be based on the overall Company Strategy. This does not necessarily imply that the details of the Authentication Strategy need to be defined understood or created by executive management. But it certainly does imply that the general path chosen by creating such an Authentication Strategy and the details defined therein are clearly communicated to the executives - and the expected effects each technology may have should be explained as well.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Mar 08, 2010

Market Overview Strong Authentication

For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought…

€695.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Executive View

Executive View: VeriClouds CredVerify™ - 72567

Securely authenticating users remains a thorny problem and VeriClouds CredVerify service can provide a useful additional level of assurance.  There are many approaches, products and services for user authentication however, the CredVerify service is unique in what it offers.  

Executive View

Executive View: PointSharp Mobile Gateway - 71508

PointSharp Mobile Gateway is an enterprise mobility solution that provides strong authentication and easy, yet secure, mobile access to Microsoft Exchange and Skype for Business, both on-premise and in the cloud.  

Executive View

Executive View: LSE LinOTP - 71452

LSE LinOTP is a standards-based, open source solution that provides token and SMS-based Multi-Factor Authentication by integrating with existing authentication challenge schemes. LinOTP provides strong authentication to hosted web and mobile applications, as well as non-web based protected…

Executive View

Executive View: FIDO Alliance - 71504

The FIDO® (Fast IDentity Online) Alliance is a non-profit organization with a mission to change the nature of online authentication.

Vendor Report

Vendor Report: AlertEnterprise - 71048

Integrating IT security, physical access security and Operational Technology security into one convergent solution concept.

Executive View

Executive View: neXus Dynamic Identity Platform - 70861

neXus Dynamic Identity Platform is a complete identity lifecycle solution that unifies physical and digital access for a broad range of supported identity types, authentication standards, and communication protocols.

Advisory Note

Advisory Note: Trends in Authentication and Authorization - 71043

How authentication and authorization have to change in the days of the Computing Troika (Cloud Computing, Mobile Computing, Social Computing), the API Economy, and the New ABC: Agile Businesses – Connected.

Vendor Report

Vendor Report: VASCO Data Security International - 70923

VASCO is a vendor in the Authentication Management market which provides solutions for strong authentication, electronic signing & digital signing. They are known for their broad range of hardware tokens for authentication & signatures and complementary software solutions. In…

Executive View

Executive View: SecureKey briidge.net™ - 71016

SecureKey Technologies provides cloud-based, trusted identity networks that enable organizations to deliver online services securely to consumers. SecureKey offers a suite of cloud based services for consumer and citizen authentication under the trademarked name of briidge.net™. There…

Executive View

Executive View: RSA Adaptive Authentication - 70889

Adaptive Authentication uses risk-based policies to evaluate a user’s login and post-login activities against a range of risk indicators. Systems then ask for additional assurance of the users’ identities when a risk score or policy rules are violated. This risk and…