Passwordless authentication with passkeys

Passwordless authentication with passkeys

Share post

An identity security company is expanding passwordless authentication capabilities in CyberArk Identity. Passkey support helps companies prevent credential theft and increase productivity by enabling easy access to applications and websites using strong authentication methods such as biometrics.

Most security breaches start with the theft or misuse of credentials. With passkeys support in CyberArk Identity, organizations can advance their passwordless authentication strategies to reduce this risk and prevent credential theft. Passkeys are a phishing-proof and FIDO2-compliant password replacement that provides the best protection against identity theft and user account takeover and is NIST Authenticator Assurance Level 3 (AAL3) compliant. They work across all of a user's devices and improve the user experience by making authentication easier and faster.

CyberArk Identity provides various SaaS solutions that simplify identity and access management in the company and offer a high level of security. As part of the CyberArk Identity Security Platform, they help organizations address user authentication, authorization and identity management challenges arising from business transformation. The CyberArk platform enables organizations to implement Zero Trust and Least Privilege with full visibility, allowing all identities to securely access all resources, regardless of where they or the resources are located, with intelligent permission controls.

Support for YubiKeys

CyberArk Identity also supports YubiKey One Time Passcode (OTP). YubiKeys are widely used security tokens that meet Authentication Assurance Level 2 of NIST Guideline 800-63B. The OTP generated by a YubiKey allows users to securely authenticate to any application protected by CyberArk Identity.

“Passwords are the weakest link in the security chain and are often the reason for cyber attacks and data leaks. By introducing passkeys for passwordless authentication, we are enabling companies to remove passwords from their authentication workflows,” explains Michael Kleist, Area Vice President DACH at CyberArk. “CyberArk's goal is to provide companies with the most comprehensive and innovative identity security solutions on the market. With the new passwordless authentication options, we not only help eliminate password-based risks, but also improve productivity and user experience.”

KuppingerCole's "Leadership Compass: Passwordless Authentication" report1 lists CyberArk as an "Overall Leader" and highlights CyberArk Identity as a "comprehensive, feature-rich and modern passwordless solution." According to the report, CyberArk Identity stands out for its remote access and BYOD security, flexible deployment options, integration with CyberArk's PAM solutions, strong partner ecosystem and proven scalability.

More at CyberArc.com

 


About CyberArk

CyberArk is the global leader in identity security. With Privileged Access Management as a core component, CyberArk provides comprehensive security for any identity - human or non-human - across business applications, distributed work environments, hybrid cloud workloads and DevOps lifecycles. The world's leading companies rely on CyberArk to secure their most critical data, infrastructure and applications. Around a third of the DAX 30 and 20 of the Euro Stoxx 50 companies use CyberArk's solutions.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more