
Content Library
-
How FIDO works
A brief introduction video to get you started how FIDO works.
-
Strong Authentication: It Is Time to Act
The threats and dangers of hosting server-side secrets are ever increasing. The costs for resetting and managing passwords are continuous and onerous. Authentication no longer needs to be a source of friction and the cause of lost revenue. It can be a gateway to greater services, greater security, better customer… -
Multifactor Authentication: Technical Whitepaper
This whitepaper presents an in-depth explanation of the FIDO architecture and the NNL S3 Authentication Suite. Intended for a more technical audience, the paper also discusses the security advantages of the architecture and its fit within the overall identity ecosystem. -
Enabling Biometrics for Mobile Application Authentication: Comparing the Suite approach with Native APIs
Username and passwords are untenable. Integrating biometrics has become an enterprise imperative that delivers both ease-of-use and improved security. This paper looks at the resources and risks associated with the native API approach and explains how Nok Nok Labs enables organizations to embrace biometrics while avoiding associated drawbacks. -
Deploying FIDO-based Authentication: NNL S3 Suite vs. “Build Your Own”
This technical white paper lays out the issues to consider when evaluating the different approaches and explains the advantages of the Nok Nok approach to strong, FIDO-based authentication. -
Putting the Mobile Network Operator at the Heart of Authentication Services
Goode Intelligence This white paper explores how mobile-based authentication solutions are addressing the needs to conveniently identify consumers. -
Smartphones, Tablets and Fraud: When Apathy Meets Security
Javelin Strategy & Research This study of over 5000 US adults investigates how the rise in mobile device usage puts personally identifiable information at risk. -
Four Barriers to Adopting Strong Authentication
This whitepaper describes four major barriers to the use of strong authentication: Cost, Usability, Security, and Privacy (“CUSP”). Each of these barriers can carry significant burdens when an organization seeks to adopt strong authentication, and businesses need to consider how these barriers may affect their adoption and deployment of additional…
< previous
- 1
- 2