Top 5 Passwordless MFA Startups

Top 5 Passwordless MFA Startups

0

For those of you who have ever had their password hacked, you will know about the anxiety it causes and the risks having a weak password can pose to yourself or your business. What you might not know about is the sheer volume of complex cyberattacks that are committed through hacking passwords alone. A report from last year by ZDnet noted that the most popular method of committing ransomware attacks is by targeting weak passwords. If you have had your password hacked on your personal account, imagine the damage an adversary could cause when targeting an entire organisation.

Many different forms of authentication software are now actively working to reduce the risk of cyberattacks, but the most successful is passwordless Multi-Factor Authentication (MFA). Without having to worry about remembering a complex password, (or the risk of someone writing it down in an insecure document) organisations are already starting to see results. In this episode of Emerge5, we are investigating the Top 5 Passwordless MFA Startups. 

Beyond Identity

Beyond Identity is the first and only company to provide passwordless identity management. Beyond Identity’s patents-pending solution employs self-signed X.509 certificates on endpoint devices to fundamentally change the way users login to the network. It extends the server-to-server chain of trust established with TLS to users and their devices. It enables users to go beyond passwordless authentication to complete passwordless identity management.

HYPR

HYPR wants to unite your security program with corporate initiatives to drive business growth. It’s a holistic and strategic approach. Your attack surface that was once expensive to defend now becomes infrastructure that is expensive to attack. HYPR's goal is to empower your customers and workforce with security through usability. True Passwordless MFA improves security posture, productivity, and digital engagement by unifying the login experience across digital channels.

Secret Double Octopus

Secret Double Octopus helps to liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication. The Octopus Passwordless Enterprise technology provides unified user experience and a consistent way to access workstations, remote services, cloud applications, and on-prem systems while providing strong protection against cyber-attacks. It also has a standards-based design to ensure easy integration with existing business systems and applications, including third-party authenticators.

Acceptto

Acceptto has an AIML-driven biobehavioural technology that analyses and verifies your identity through real-time threat analytics. Using cognitive authentication, a multi-context combination of behaviours, attributes and spatiotemporal velocity, it detects and prevents identity access fraud across the enterprise and end consumers. This establishes a firm understanding of user behaviour, transactions, and application activity in order to create an enriched user profile and subsequently verify if access attempts are legitimate or a threat.

AuthN by IDEE

AuthN is interoperable and can be deployed in addition to existing SSO, hardware-token and password-management investments. Insider threats and human errors are also reduced as AuthN offers no central credential database of any kind. Their security idea means that no data entry is needed to login, meaning that if there is nothing to type then malware can't steal it; all the user has to do is biometrically unlock their phone.