Market Overview Strong Authentication

Report Details

For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought this mode of authentication to a point where users and administrators are no longer able to cope with it. Be it the increased level of security, a.k.a. authenticity, required by the service provider, or compliance requirements: other means of authentication are necessary to keep up with future system designs and customer experience expectations. Still, we all suffer from having to remember a multitude of these credentials and now companies are looking for ways out of this password-trap. But what to choose from an ever growing market of clever and appealing authentication solutions? A question not lightly answered in general, as requirements for different applications and services might greatly differ.

Depending on what purpose the new authentication mode shall serve - be it more usability, general applicability in multiple use-cases, higher security or others - several solutions might seem appropriate. Thus, a one-size-fits-all approach to authentication is definitely something not feasible, and so are point-solutions that create high maintenance cost while offering a limited number of application scenarios. Companies must create an elaborate and comprehensive Authentication Strategy, which is tightly aligned with its Security Strategy - which, in turn, needs to be based on the overall Company Strategy. This does not necessarily imply that the details of the Authentication Strategy need to be defined understood or created by executive management. But it certainly does imply that the general path chosen by creating such an Authentication Strategy and the details defined therein are clearly communicated to the executives - and the expected effects each technology may have should be explained as well.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Mar 08, 2010

Market Overview Strong Authentication

For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought…

€695.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Leadership Compass

Passwordless Authentication

This report provides an overview of the market for Passwordless Authentication products and services and presents you with a compass to help you to find the Passwordless Authentication product or service that best meets your customers, partners, or workforce needs. We examine the market…

Whitepaper

Einfachere und stärkere Authentifizierung mit passwortloser Desktop-MFA

Wenn ein Passwort wie ein Hausschlüssel ist, dann sollte die Grundlage der Sicherheit der IT-Systeme eines Unternehmens eine sicher verschlossene Eingangstür sein. Wenn die Eingangstür bestmöglich gesichert ist, dann brauchen Sie vielleicht nie wieder Schlüssel für weitere Türen. Durch die…

Whitepaper

Customer authentication with zero-friction passwordless authentication

To increase security and convenience, businesses and organizations need to adopt and implement a modern authentication system that does not rely on customers remembering usernames and passwords. Beyond Identity's newest product, Secure Customers, is a secure and frictionless authentication…

Executive View

Beyond Identity Secure Customers

Password authentication is not only insecure, but it leads to poor consumer experiences and is costly for organizations to maintain. As far as customer authentication is concerned, there are three main problems: friction, security, and legacy MFA solutions. Beyond Identity's Secure Customers…

Executive View

HYPR Passwordless and Phishing-resistant Authentication

Die passwortlose Authentifizierung wird zum neuen Standard. Benutzer müssen keine lästigen Passwörter mehr verwenden und die mit Passwörtern verbundenen Sicherheitsrisiken werden umgangen. Innerhalb der großen Auswahl an Lösungen, die für sich in Anspruch nehmen, ohne Kennwörter zu arbeiten,…

Whitepaper

Simplifying and Strengthening Authentication with Passwordless Desktop MFA

If a password is like a house key, the security foundation of an organization's IT systems should have a securely locked front door. Make the front door as secure as possible, and you may as well never need a house key again. By implementing more complex passwords, organizations end up…

Whitepaper

The Future is Passwordless. If you do it right.

Passwordless authentication has become a popular topic. Given the security risks and inconvenience of using passwords, many organizations are looking to completely eliminate and replace passwords with more secure authentication methods. As credential theft and ransomware attacks continue to…

Executive View

HYPR Passwordless and Phishing-resistant Authentication

Passwordless authentication is becoming the new normal, bypassing the need for users to maintain passwords, and thus bypassing the inherent security challenges of passwords. In the broad range of solutions that claim being passwordless, HYPR excels with its desktop and Microsoft Active…

Executive View

NRI SecureTechnologies Uni-ID Libra 2.6

Consumer Identity and Access Management (CIAM) continues to be a growing market, offering a better user experience for the consumer and new challenges for the organization. Focusing on the Japanese market, the updated NRI Secure's Uni-ID Libra v2.6 continues to provide innovative features…

Executive View

Beyond Identity Secure Work

Secure Work is a passwordless authentication solution that aims to enable zero trust and enforce device trust (i.e., ensuring the trustworthiness of a device for being authorized to access applications and data), while providing a strong multi-factor authentication and allowing access to…