Fixing the Way the World Logs In

In order to watch this video, you have to log in or create an account, if you don't have one yet.
By continuing, you agree that the speakers of this event will have access to the video statistics.

Passwords are quickly and easily compromised, they are costly and difficult to manage, and they result in poor user experiences. Many organizations are looking for alternatives, but find it challenging to identify appropriate passwordless and phishing resistant authentication solutions that are simple, effective, and secure. Join experts from KuppingerCole Analysts and HYPR, the passwordless authentication company, for a discussion about why passwords are no longer fit for purpose and how passwordless and phishing resistant MFA can help the business by enabling digital transformation, and reducing cost and risk, while improving user experience at the same time. They will also discuss how best to go about making the switch.

Martin Kuppinger, Principal Analyst at KuppingerCole explains the essentials of passwordless and phishing resistant MFA, its business benefits, and why decentralized credentials and desktop authentication integration are important. He also outlines key factors and practical steps for making passwordless and phishing resistant authentication a reality to cover all access use cases in hybrid environments.

Jochen Koehler, VP Continental Europe at HYPR, details HYPR’s approach to truly passwordless and phishing resistant MFA that is designed to be a simple and secure way to eliminate passwords and shared secrets, enabling organizations to achieve uncompromising assurance and a consumer-grade experience.

Language: English • Duration: 47:59 • Resolution: 1920x1080

Learn more about this webinar

Latest Related Videos

More Related Videos

Stay Connected

KuppingerCole on social media

Next Webinar

Webinar

Effective Threat Detection for Enterprises Using SAP Applications

Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00