Authentication

Authentication

Transform your identity security with secure and agile authentication solutions

Complex Authentication
Authentication
Locked Accounts: Why Complex Authentication Methods Are Hurting Your Customers & Business

As a customer, there are few things more frustrating than being locked out of your own account. The steps needed to reset your password, wait...

CIAM biggest issues
Authentication
The 8 Biggest Issues in CIAM Today

By now the issue with passwords is prevalent to both customers and online vendors. As our world continues to rely on digital services for almost...

Netflix Is Onto Users Who Share Their Passwords
Authentication
Netflix Is Onto Users Who Share Their Passwords

Earlier this week, Netflix caused a bit of a stir as they rolled out a new way to ensure that your account is used only...

Identity Portability
Authentication
Identity Portability: Is This the End of Usability vs. Security?

The traditional trade-off between authentication usability and security has finally ended. Who would have thought? For years we were taught to believe that when it...

[Infographic] The 8 Biggest Issues in CIAM Today
Authentication
[Infographic] The 8 Biggest Issues in CIAM Today

Passwords. Customers hate them, vendors need them. They cause friction for customers and are the source of many unnecessary, frustrating online experiences. A complicated authentication...

Passwords and the Evolution of Imperfect Authentication
Authentication
Passwords and The Evolution of Imperfect Authentication

In a constant effort to stay ahead of hackers and fraudsters, authentication technology is constantly (and quickly) evolving. The latest becomes outdated extremely quickly. The...

Authentication
How 2020 Shaped the Year of Cybersecurity

There are still many unknowns left on this roller-coaster ride of a year like, when will we hug our friends and family again? Finally take...

Transmit Says “hi” to Microsoft Windows Hello
Authentication
Transmit Says “hi” to Microsoft Windows Hello

In the past few months there has been a lot of buzz about Microsoft’s Windows Hello after it was announced that Windows 10 was going...

5 Reasons Why Service Providers Should Have Custom Authenticator Apps
Authentication
5 Reasons Why Service Providers Should Have Custom Authenticator Apps

As an application owner, you’re well aware of the need to secure access for your users. You may have thought about or even have already...

3 Reasons You Need Identity Orchestration for Your IdP (1)
Authentication
3 Reasons You Need Identity Orchestration for Your IdP

Traditional identity providers (IdPs) are essential for single sign-on (SSO) and federation for employee and customer access to resources ranging from custom-built applications to cloud-based...

Integrating Identity and Risk for Real-time Threat Mitigation
Authentication
Integrating Identity and Risk for Real-time Threat Mitigation

Contributed by Eric Rogers, Regional Vice President, Sales – West This past Monday marked the beginning of my fifth week at Transmit Security. I’ve been...

The Tech-Road Ahead 2020 Trends Require a Radical Rethinking of IAM
Authentication
The Tech-Road Ahead: 2020 Trends Require a Radical Rethinking of IAM

Gartner released the Top Tech-Trends for 2020 at its recent CIO Conference in Barcelona. Interestingly, all of the trends Gartner identified will require drastically increased...

1 2 3