There are numerous passwordless authentication solutions currently on the market, the majority of which are completely acceptable solutions for locking down authentication to corporate resources. Note that this list of vendors compiled below is not comprehensive: inclusion is not an endorsement, nor should exclusion be interpreted as an indictment against a particular offering.
AuthID Verified Workforce
AuthID Verified Workforce offers several key capabilities surrounding user authentication with a heavy focus on biometric certainty. AuthID’s AI-backed biometric matching capabilities go beyond simple biometrics, ensuring the user is live and providing protection against spoofing attempts. AuthID supports the FIDO2 authentication standard, with crypto keys generated and retained on the device, not transmitted or stored in the cloud. AuthID also knows that passwordless authentication is of limited value without it being part of a larger ecosystem of authentication policies, anomaly detection, and monitoring, which is why AuthID offers integration with third party identity and access management (IAM) tools.
Axiad Cloud
Axiad Cloud is an authentication platform that takes a holistic approach to securing authentication attempts through passwordless orchestration. Axiad Cloud leverages the user existing IAM suite to facilitate the transition to passwordless, whether that’s configuring authentication methods or provisioning new users. Axiad Cloud also offers both an admin portal and an end user portal, empowering security pros to customize authentication workflows and fine tune how user authentication is evaluated and confirmed.
Beyond Identity
Beyond Identity couples passwordless authentication with continuous risk-based authentication. This means authentication attempts are evaluated based on rich context such as the device being used, the user and their current location, the resource being accessed, and other key factors necessary to evaluating trust. Beyond Identity also uses existing device hardware such as biometrics and Trusted Platform Module (TPM) chips to further secure authentication attempts and cryptographic keys. Beyond Identity supports integration with IAM suites as well as Active Directory Federation Services (ADFS) for passwordless authentication to on-prem apps.
CyberArk Workforce Identity
CyberArk’s Workforce Identity product was formerly operated under the Idaptive brand. CyberArk supports all passwordless use cases including endpoint authentication using their deployable software agent. CyberArk also offers an application gateway, a service which facilitates securing authentication to on-prem applications by funneling user traffic through the application gateway to the application, allowing CyberArk to authenticate users prior to the application. CyberArk also offers adaptive authentication capabilities, allowing CyberArk to dynamically choose what authentication factors are appropriate given the context of the authentication attempt.
Duo
Duo is a hugely popular MFA service from networking superpower Cisco. Duo’s services make it a strong choice for your business’ passwordless journey. Duo supports every authentication use case imaginable: including desktop, web applications, VPN, and remote desktop. Duo offers the tools to bring other key aspects of authentication security to the table as well: contextual risk-based authentication, monitoring authentication attempts, and integrations with effectively every IAM suite on the market.