Passwordless Security Evaluation Guide
Passwordless Security Evaluation Guide
EVALUATION GUIDE
12 Key Considerations for Assessing
Passwordless Multi-Factor Authentication
(PMFA) Solutions
About this Guide
Organizations of all sizes and across all sectors are looking to passwordless This guide will help you discern among available passwordless
authentication to make their authentication processes more secure while security products and determine which solution best suits all
reducing friction. And for good reason. Nearly two-thirds of all breaches and the needs and requirements of your organization. This guide is
all ransomware attacks start with credential theft and account compromise. intended for:
Passwords are one of the key targets for attackers, largely because they are easy IT and system administrators
to steal and typically stored in one place.
Identity and Access Management (IAM) architects
True passwordless authentication keeps out those who shouldn’t have access
Security teams
while making sure the right people can get in seamlessly — and it’s the single
strongest security measure you can implement to keep your organization, your CIOs
users and your customers safe. CISOs
But the passwordless authentication landscape can be challenging to navigate. Anyone interested in better security
Not all solutions are created equal, and terminology can be confusing or even
misleading. Some don’t meet compliance requirements. Some may meet
What You’ll Learn:
technical definitions but are still vulnerable to attack. And many have hidden
costs in the form of lengthy and complex deployment, extensive and time- The biggest authentication security risks
consuming training and support and vendor lock-in.
A comprehensive set of criteria to evaluate
passwordless solutions
Gartner calls passwordless authentication a critical information Alignment of password authentication with
security technology to adopt now.1 compliance, certification, and standards
Are you in a highly regulated industry How much business disruption would How much have you budgeted to cover
or sector? be involved in making the switch to the costs for multi-factor authentication
passwordless authentication? (MFA)?
Does your cyber insurance require you
to have MFA? Will users embrace the new technology Have you included the intangible costs
or resist it? of deployment, such as implementation
What kind of sensitive data does your
time IT resources needed and a potential
organization handle? To what extent do you want your
slowdown in user productivity?
passwordless authentication to protect
Do you have multiple identity providers?
against specific threats, such as credential How much do fraudulent transactions
Do you employ a hybrid or remote
phishing and push attacks? and attack mitigations cost you
workforce?
currently?
How developed is your cloud infrastructure,
Does your organization interface with
and how do passwords and shared secrets
customers online?
make your organization vulnerable?
If your business is subject to data privacy regulations, such as the EU General 8. Secure Storage of Private Keys
Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA), A passwordless authentication solution can still be vulnerable to
make sure the solution does not share or store sensitive or personally identifiable device-side attacks by hackers, even if it uses public key cryptography.
information (PII) in the cloud, or send users SMS codes. Any security-relevent Malware, side-channel attacks and reverse engineering are among the
data should be encrypted (AES-256 or stronger), with each tenant’s data stored many techniques available to attackers who want to steal the private
in a segregated database invisible to other tenants. keys of a cryptographic system. To ensure key safety on mobile devices,
Make sure your vendor has a failover process in place, with service distributed authentication systems should utilize hardware-based security, such as
geographically and across multiple providers and power grids.Ideally, your ARM’s TrustZone technology, Android’s Trusted Execution Environments,
vendor should guarantee 99.99% uptime, backed by strong service level the iOS Secure Enclave or Samsung KNOX to store keys and perform
agreements (SLAs). cryptographic operations.
In addition to adhering to compliance regulations, find out if the vendors Other points to consider are productivity impact for employees and how
under review hold up-to-date independent certifications. This provides successfully the solution reduces authentication-related help desk issues.
assurance of their commitment to security and privacy standards and For example, solutions that utilize a smartphone-based authenticator app
will enable you to obtain proof-of-compliance reports for your auditors. generally have fewer help desk calls as users are less likely to forget or
Vendors with SOC 2 Type 2 certification have had their security procedures lose their smartphone.
and controls fully vetted by a third-party, independent auditor. Another critical question to ask a vendor is whether their passwordless
Various ISO certifications provide additional assurance regarding controls authentication solution integrates with your legacy systems and preferred
to ensure the confidentiality, integrity and availability of customer identity provider(s). Will the solution enable you to integrate and streamline
information; measures that reduce risk in the cloud; and data privacy and fragmented authentication processes and identity systems?
protection of personally identifiable information (PII) in cloud computing. Authenticator costs are another TCO consideration. Do you have to
Finally, to further aid your organization with compliance audits, ask your purchase, manage and administer hardware authentication devices?
vendor if they create an audit trail that reports data on authentications For mobile authenticators, confirm if there is any per-device cost or if an
across mobile devices and workstations, along with errors that may unlimited number of enrolled devices is permitted for each user license.
have occurred. Data center costs are an often-overlooked expense of an on-premises
authentication solution. With a cloud-based solution, you don’t have to
absorb the associated management costs.
NIST (800-63B)
Research the vendor’s reputation. Check analyst research from Gartner, A fully FIDO Certified authentication system, HYPR also serves on the board
Forrester and other industry experts to compare how the vendor rates of the FIDO Alliance and is 100% committed to improving security and
against competitors and what their strengths and weaknesses are from an system interoperability. Our cloud-based solution is architected for 99.99%
independent third-party perspective. availability, and we deliver 100% monthly uptime for the majority of our
customers. HYPR has been recognized by Gartner in its “2021 Market
Make sure the vendor provides regular release updates and has a proven
Guide for User Authentication” and its 2022 “Emerging Technology
track record of responding to customers’ needs in terms of fixes, features,
Horizon for Information Security” as a leading supplier of passwordless
protections and system coverage.
authentication. Additionally, HYPR holds SOC 2 Type 2 and ISO 27001,
Ask your vendor for customer references that you can contact directly to 27017 and 27018 certifications.
gain insights on their experiences with the company and the solution. Talk to
HYPR dedicates itself to the success of its customers and believes in
their customers about the responsiveness of the vendor’s technical support
providing a positive and productive experience — from initial deployment
and development teams.
to ongoing technical support. Onboarding is straightforward and streamlined
Also, find out about speed of deployment and the time and resources — new employees can be productive their first day on the job.
involved in management and maintenance. Can and will your chosen vendor
help you navigate the optimal deployment for your organization? Does
your vendor have extensive, proven experience and skills in the field and “After looking at countless authentication products, we
especially in your industry sector and environment? decided that the best way to address our cybersecurity
issues was HYPR’s passwordless multifactor solution.”
Buyer’s Tip:
Inquire about customer satisfaction scores and retention Joe Kynion, VP/Information Technology Officer
rates. If a provider keeps their customers happy, it’s First Citrus Bank
a good indication that they will be a reliable security
partner for you.
1 Gartner, Emerging Technology Horizon for Information Security, Published 16 November 2021
2 Using Zero Trust To Kill The Employee Password, Forrester Research, Inc., August, 2021
Visit: hypr.com/demo
7 Forrester, Beyond Boundaries: The Future Of Cybersecurity In The New World Of Work, September
2021
8 https://www.forbes.com/sites/forbestechcouncil/2021/11/23/whats-blocking-the-adoption-of-
passwordless-authentication/
10 2021 State of Passwordless Security Report, HYPR, February, 2021 About HYPR
11 https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance
HYPR fixes the way the world logs in. HYPR’s true passwordless
multi-factor authentication (PMFA) platform eliminates the
traditional trade-off between uncompromising assurance and a
consumer-grade experience so that organizations decrease risk,
improve user experience and lower operational costs.