Full-Length EMA Research Report: Passwordless Authentication
Information security professionals are in agreement: passwords are a major problem for IT departments and end-users alike. And while lower-friction authentication methods, such as biometrics and device-based authentication, are beginning to see broader adoption, credential-based methods of logging on are still ubiquitous.
New research from Enterprise Management Associates shows that enterprises are experiencing major consequences as a result of their reliance on passwords, and are making plans to go passwordless. What new methods will they prioritize? And what hurdles to adoption remain?
Register for the full research report to learn:
- What 200 information security professionals identified as the top requirements, challenges and approaches to introducing passwordless authentication in their enterprise
- Why 90 percent of respondents experienced a significant password policy violation in the past year
- What passwordless methods IT leaders are preparing to adopt in the next few years
- The top methods leaders define as being both secure and convenient for users
No thanks, please take me to the access management and authentication home page.
Full-Length EMA Research Report: Passwordless Authentication
Information security professionals are in agreement: passwords are a major problem for IT departments and end-users alike. And while lower-friction authentication methods, such as biometrics and device-based authentication, are beginning to see broader adoption, credential-based methods of logging on are still ubiquitous.
New research from Enterprise Management Associates shows that enterprises are experiencing major consequences as a result of their reliance on passwords, and are making plans to go passwordless. What new methods will they prioritize? And what hurdles to adoption remain?
Register for the full research report to learn:
- What 200 information security professionals identified as the top requirements, challenges and approaches to introducing passwordless authentication in their enterprise
- Why 90 percent of respondents experienced a significant password policy violation in the past year
- What passwordless methods IT leaders are preparing to adopt in the next few years
- The top methods leaders define as being both secure and convenient for users
No thanks, please take me to the access management and authentication home page.