Authentication is a complicated problem with ever-creeping scope. Passkeys provide phishing-resistance at the point of authentication, but you need protection at enrollment and during the authenticated session thereafter, too, to truly fortify the authentication process against evolving threats. 

In this discussion, authentication experts walk through all of the components of a user authentication workflow, highlighting areas of innovation and future steps for securing enrollment, authentication, and sessions.  


More

Webinar: Misconceptions about passkeys

In the years since passkeys were first announced, a lot has changed in their availability…

Read More →

UX Webinar Series: Essentials for Adopting Passkeys for your Consumer Authentication Strategy

In part one of this four-part webinar series, attendees learned why major service providers are…

Read More →

UX Webinar Series: Aligning Authentication Experiences with Business Goals

In the second of a four-part webinar series, attendees learned how to adapt your authentication…

Read More →


12323 Next