Authentication

Authentication

Transform your identity security with secure and agile authentication solutions

Authentication
Securing the User Lifecycle for Passkeys With Transmit Security

In the face of increased data breaches and account takeover attacks, there is a growing need for authentication methods that guard against phishing, credential stuffing,...

Authentication
Top Gartner IAM Talk with Citigroup: “Rolling Out Passwordless to 200M Banking Clients in 160 Countries”

If drawing a crowd at Gartner IAM is proof, it’s fair to conclude: identity professionals are hungry to hear from other companies that have crossed...

Authentication
8 Critical Identity Management Capabilities Every Modern CIAM Solution Must Have

As the digital ecosystem continues to evolve, so do security threats, regulations and customer expectations, making it difficult for businesses to keep up. This heavy...

Cloud Identity and Cloud Authentication
Authentication
Microsoft and Transmit Security Partner to Deliver Passwordless MFA for Companies Using Azure AD B2C to Authenticate Customers 

Microsoft and Transmit Security are partnering to elevate Azure Active Directory B2C platform with passwordless customer authentication. The Transmit Security passwordless authentication service is now...

Authentication
Invisible Security

As organizations across industries have embraced digital transformation, the opportunity for cyberattacks has increased exponentially. Despite the need for assurance that their technology is secure,...

Authentication
Authentication in E-Commerce

In the early 2000s, people hotly debated whether e-commerce would be a viable business model. Over the last twenty years, the debate has become non-debatable,...

Authentication
OpenID Connect (OIDC) vs OAuth2

In some situations, one application may need access to data held by another application. A common example is a list of contacts used to send...

Holiday gift cartoon banner
Authentication
Attention All Retailers: Brace for a Longer Storm of Holiday Shopping in 2021

If you’re like most retailers, you started rolling out holiday deals earlier than ever, expanding Cyber Monday into Cyber Month. It feels like we’re watching...

Authentication
How Device Biometrics and WebAuthn Ended Passwords

For years, businesses and consumers have suffered due to passwords and their frustrating consequences. And there have been no real alternatives, just the many solutions...

What Is 2FA vs. MFA, SCA and Step Ups?
Authentication
What Is 2FA vs. MFA, SCA and Step Ups?

Two-factor authentication has invaded nearly every corner of our digital lives — a gradual but relentless escalation over the years. Most consumers are now very...

Authentication
FIDO2: What Every C-Level Needs to Know & Why Your Business Needs It

Fast identity online (FIDO2) isn’t just about improving your own cybersecurity efforts. It’s a calculated approach that also improves your users’ experiences and reduces friction...

SMS Two Factor Authentication Isn’t Enough
Authentication
Why SMS Two Factor Authentication Isn’t Enough. And What You Should Use Instead

One-time passwords sent via SMS aren’t a reliable indicator of identity. And, as it turns out, they never really were in the first place. Because...

1 2 3