Planning Recommendations for implementation of Passwordless Authentication. Covering Existing Modals Inventory, Device & User Inventory, Pilot, Case Study Analysis and Roadmapping.
100+ questions that can be used during the request for proposal phase of vendor engagement for Passwordless Authentication providers.
An analysis of Consumer Use Cases for Passwordless Authentication
An analysis of Employee Use Cases for Passwordless Authentication
A review of the Key Organisational Challenges that exist with respect to Authentication
Join us on Wednesday November 10th for a free 60 minute launch event webinar for our latest buyer’s guide focused on passwordless authentication and associated technology. Our buyer’s guide for passwordless authentication was released on October 18th after a 10 week research effort, analysing the key vendors, design patterns and capabilities in the space. We […]
Authentication does not exist in a vacuum. It does not exist in a silo. The aim of authentication, is not authentication. It exists to support secondary events such as employee application access, consumer transaction completion or purchases. That seems pretty obvious when you write it down and read it aloud. However, we still tend to […]
A few weeks ago I ran a slightly provocative and not very scientific poll on LinkedIn asking which was the more important: authentication or authorization? Clearly in the grand scheme of things that is a pretty pointless exercise, but the rationale was to really identify some thought processes and reactions. It provided some interesting responses. […]
Let us start with a few definitions just to get started. Authentication is focused upon asserting the properties of an entity and confirming a level of assurance. The typical process of signing in or logging in. Clearly authentication for people is quite a well known process, as we perform the task every day – sometimes […]
Recently I discussed how “You’re Only As Strong As Your Password Reset” – with an emphasis on how credential reset activities could well be an Achilles heel when it comes to authentication journeys. Whilst many organisations rightly start to add multi factor authentication and passwordless authentication to their arsenal of security and usability controls, it […]