8 Ways to Authenticate Without Passwords

Passwordless authentication has a shot at becoming more ubiquitous in the next few years. We take a look at where things stand at the moment.

Steve Zurier, Contributing Writer, Dark Reading

May 28, 2019

9 Slides

Already have an account?

So are we finally doing this? Are we finally moving to passwordless authentication?

Microsoft and Google have been pushing this aggressively over the past several months, and Apple has been a major player by being the first out of the box with fingerprint authentication on the iPhone. Most PCs and Mac laptops now offer Touch ID, so inside of a year or two people can use them for passwordless authentication, too.

The industry largely views passwords as outdated and one of the major causes of breaches. According to the Verizon's "2019 Data Breach Investigations Report," more than 80% of breaches leverage stolen or weak passwords. That's why the industry has been pushing for open standards, such as FIDO (Fast Identity Online), which would help security teams and developers more readily deploy passwordless authentication. The FIDO Alliance, which was founded by next-generation authentication company Nok Nok Labs, PayPal, Lenovo, Validity Sensors, Infineon, and Agnitio, first began its development of the passwordless authentication protocol in 2012.

Recent research by Ant Allan, a Gartner analyst who focuses on passwordless authentication, predicts that by 2022, 60% of large and global enterprises and 90% of midsize enterprises will implement passwordless methods in more than 50% of use cases — up from 5% in 2018.

To be sure, vendors have taken notice. Here are eight of the leading passwordless authentication approaches and a look at what needs to happen moving forward.

About the Author

Steve Zurier

Contributing Writer, Dark Reading

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights