Authentication

Webcast

Reducing Authentication & Authorization Risks in Today´s Open Flexible Business Environments

Kuppinger Cole Webinar recording

Blog

Creating Authentication Strategies

Joining a special "reality" session was the best choice I made while attending IIW. Not only was this a wonderful opportunity to compare our KuppingerCole approach to providing insight and second opinion on the exact topic, but getting a deeper understanding of how to analyse and structure…

Blog

Motion in the authentication market

With today's completion of the takeover of the SafeWord product family of Secure Computing by Aladdin, a new mobility has entered the dynamic market for strong authentication mechanisms, which has already been expanding in the past three to four years The market had already clearly profited…

Blog

The secret leader in context-based authentication and authorization?

Context-based authentication and authorization is one of the topics which have the potenzial to become the next hype. I've posted twice on this subject, here and here and we had, led by Dave Kearns, a lot of discussions around this at our EIC 2008. I'm convinced that the topic will become…

Blog

Yubikey - New Hardware for Strong Authentication

Recently I came across YubiKey, which is a hardware token generator from a young Swedisch comapny called Yubico. YubiKey is a small and slim USB device with just one button. If you push it, the device produces a 1-time password and sends it to the server. Compared to token generators in card…

Blog

Context-based Authentication

In the past few years, the approach of risk-based authentication has gained in importance, particularly in banking. The goal is to anticipate possible attacks on the basis of information gained from Fraud Detection solutions used for authentication, and – in these cases – to refrain from…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Don’t Blame the Cloud for Capital One’s Troubles

After the recent Capital One breach, some commentators have suggested that cloud security is fundamentally flawed. Like many organizations today, Capital One uses Amazon Web Services (AWS) to store data, and it was this that was targeted and successfully stolen. In the case of Capital One it was process, not technology, that failed. The company failed on three points to secure its data properly using the extended tool sets that AWS provides. It relied only on the default encryption settings in [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00