Insights

Passwordless Authentication

Passwordless Authentication solutions should provide a consistent login experience across all devices, introduce a frictionless user experience, include an integrated authentication approach, and ensure that no passwords or password hashes are traveling over the network.

Guide
Guide
Passwordless Authentication: Your Guide to a Passwordless Journey
A definitive guide to passwordless authentication for enterprises to secure their business. An infotainment deep dive into authentication, from what passwordless authentication really means, to the...
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
Putting Your First-Line Worker at the Center of Attention
Since the beginning of the Covid-19 crisis, the use of language in public life, in the press, and in everyday life has changed. Terms that were formerly confined to the circles directly affected...
Learn more
Executive View
Executive View
HYPR Passwordless and Phishing-resistant Authentication
Die passwortlose Authentifizierung wird zum neuen Standard. Benutzer müssen keine lästigen Passwörter mehr verwenden und die mit Passwörtern verbundenen Sicherheitsrisiken werden umgangen....
Learn more
Webinar Recording
Webinar Recording
We Need to Talk About Passwords – Urgently!
Passwords have been used for authentication for decades and continue to proliferate. Yet we know they create friction for users, slow down business productivity, and are a weak form of user...
Learn more
Authentication and Education High on CISO Agenda
Blog
Authentication and Education High on CISO Agenda
Multifactor authentication and end-user education emerged as the most common themes at a CISO forum with analysts held under Chatham House Rules in London. Chief information security officers...
Complying With PSD2: Everything You Need to Know
Webinar Recording
Complying With PSD2: Everything You Need to Know
With the Revised Payment Service Directive (PSD2) coming into full effect this fall, banks and online retailers need to adapt to changes that carry with them many regulatory and technical...
Facilitating Business with State-of-the-Art Identity Proofing Solutions
Webinar Recording
Facilitating Business with State-of-the-Art Identity Proofing Solutions
For traditional or Business-to-Employee (B2E) IAM, HR departments are responsible for gathering documentation from employees to determine their suitability for employment. For Business-to-Consumer...
Leading IDaaS Supplier OneLogin Aiming for the Top
Blog
Leading IDaaS Supplier OneLogin Aiming for the Top
OneLogin is among the leading vendors in the overall, product, innovation and market leadership ratings in KuppingerCole’s latest Leadership Compass Report on IDaaS Access Management , but...
The Compelling Case for Risk-Based Adaptive Authentication
Webinar Recording
The Compelling Case for Risk-Based Adaptive Authentication
Consumers and employees are increasingly on-the-go, and that means that more transactions and more work originates from the mobile phone. Fraud and data loss rates have also been rising. A...
PSD2 in a Europe of Small Principalities
Blog
PSD2 in a Europe of Small Principalities
Europe’s consumers have been promised for some years now that strong customer authentication (SCA) was on its way. And the rules as to when this should be applied in e-commerce are being...
Regaining Control With IGA Solutions
Webinar Recording
Regaining Control With IGA Solutions
Role management remains a pivotal challenge in many companies. Regulations (such as BAIT and VAIT in Germany) require companies not only to implement an IGA solution (Identity Governance &...
Facebook Breach Leaves Half a Billion Users Hanging on the Line
Blog
Facebook Breach Leaves Half a Billion Users Hanging on the Line
It seems that there is simply no end to a long series of Facebook’s privacy blunders. This time, a security researcher has stumbled upon an unprotected server hosting several huge databases...
It’s Time to Forget Your Password and Settle for Multi-Factor Authentication
Webinar Recording
It’s Time to Forget Your Password and Settle for Multi-Factor Authentication
The majority of security breaches and attacks can be traced back to stolen and compromised passwords. Mobile devices are often particularly vulnerable because many users tend to avoid long...
Account Takeovers on the Rise
Blog
Account Takeovers on the Rise
Account Takeover (ATO) attacks are on the rise. The  2019  Forter  Fraud Attack Index  shows a 45% increase in this type of attack on consumer identities in...
Previous
4 5 6 7 8 9 10 Next