• Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Partners
    • Clients
    • News
    • Blog
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Partners
    • Clients
    • News
    • Blog
    • Support Services
Nok Nok
Nok Nok News

Nok Nok News

13 Dec
3 Min read

4 Business Benefits Of Passwordless Authentication

December 13, 2022 Nok Nok News Industry News 0 comments

Older, more traditional digital security systems use the familiar technique of password authentication. As long as the correct password is given, access is granted. However, in today’s business world, password systems are increasingly more vulnerable and prone to theft and intrusion. Fortunately, passwordless authentication systems are now widely available, and there are four major benefits, according to Entrepreneur.

Theft Reduction

When businesses use passwords, this system, especially if there is only a single point of authentication, is more vulnerable and can lead to more intrusions. Phishing and even brute force attempt like guessing at commonly used passwords all lead to break-ins which can result in identity theft and even stolen data or funds.

Passwordless authentication systems significantly reduce this chance of theft.

Negate Password-Based Attacks

Some of the most common forms of digital crime include “phishing,” which tricks victims into giving up their password, and “keylogging,” which is spyware that monitors what keys are being pressed on a keyboard. Passwordless authentication, however, completely nullifies any criminal attempts reliant on password-based activity.

Techniques such as biometrics that use facial, fingerprint, voice recognition, and passkeys, which rely on encrypted keys embedded in specific devices, are part of the new multifactor authentication system that repels all password-based attempts at theft.

Lower Expenses

Little things add up over time and the amount of time. The expense of handling issues related to password-based security is an unnecessary expenditure that can be reduced or eliminated through passwordless authentication.

Password storage and, more importantly, password administration can be costly. There are also time and financial expenses involved with password resets, password recovery, and dealing with the fallout of password theft when criminal activity occurs. Passwordless authentication reduces these expenses.

Improved User Experience

Customers prefer speed, efficiency, and convenience, but older password-based systems can impede all this. Having to remember complex passwords or managing a number of them can slow down log-ins, especially when customers can’t remember and need a reset to access their own data.

Passwordless authentication is faster, safer, and more convenient. Biometric authentication, for example, requires only what a user always has, such as their voice, fingerprint, or face. This means there is never a question of forgetting an important security element. With additional redundancies, such as passkeys for multifactor authentication, these systems can also be much more secure for everyone.

Increasingly more secure systems are evolving thanks to adopting FIDO technologies that use passwordless authentication systems. If you’re interested in how you can upgrade to passwordless authentication systems, read here to learn more.

Read more
06 Dec
3 Min read

SDPs & Zero Trust Networks Are The More Secure Alternative To VPNs

December 6, 2022 Nok Nok News Industry News 0 comments

Virtual private networks, or VPNs, offer a convenient technology solution for some computer users. With VPNs, users can create private, encrypted “virtual networks,” which are more secure than standard open networks and also provide a measure of anonymity. 

For example, one of the most common uses of VPNs is for global users to disguise a VPN as an American network and sign up for American versions of services that may differ from their local offerings. Similarly, using VPNs to fool a computer into believing the user is in another location unlocks different pricing tiers and schemes for airfare, resulting in paying lower airfare if an online vendor believes a user resides in one country versus another.

However, while this anonymity and extra level of control do provide additional cybersecurity, according to TechTarget Network, VPNs are still a less secure option to new protocols such as SDPs and zero-trust networks.

What Is An SDP?

SDP stands for software-defined perimeter. A typical network defines its “border” or “perimeter” through hardware. Printers, phones, security cameras, and even appliances are all detectable hardware that can be discovered and used to define and attack the perimeter of a network. A software-defined perimeter or SDP is like software “invisibility,” that hides all the hardware aspects of a network, rendering them invisible to conventional means of network detection.

As a result, typical cybersecurity threats such as server scanning, SQL injection, and denial of service are largely negated because these techniques can’t see or exploit an SDP. This is a big differentiator from a normal VPN, which, while encrypted, still runs on normal, unencrypted networks that are vulnerable to conventional cybersecurity attacks.

The Zero Trust Difference

In older cybersecurity practices, one verification is typically required at the beginning of a session and, once authenticated, grants full access. “Zero-Trust networks,” however, work on a different philosophy. Multiple authentications can be required for various interactions, and access to other parts of a network is often very limited, mitigating the amount of damage an unauthorized user can inflict, even if barriers to entry are bypassed.

This combination ensures that an SDP with a zero-trust network protocol is much more secure than a VPN alone. However, an SDP system is flexible enough to accommodate VPNs within its own network, adding even greater layers of cybersecurity for those needing it.

These measures and others, such as FIDO technologies that use passwordless authentication systems, are improving security, and you can read here to learn more.

Read more
29 Nov
1 Min read

Nok Nok and UberEther Partner to Deliver Phishing-Resistant MFA Fedramp-Certified IAM Solutions to Protect the US Federal Government and its Suppliers

November 29, 2022 Nok Nok News Press Release 0 comments

Nok Nok’s S3 Suite brings Next Level MFA to UberEther’s IAM Advantage Platform. Read the full press release.

Read more
29 Nov
3 Min read

Former Hacker Has 3 Tips For Better Cybersecurity

November 29, 2022 Nok Nok News Industry News 0 comments

Kevin Mitnick was a hacker that was eventually charged and prosecuted for wire fraud crimes. However, he left that life behind and began a career as a cybersecurity consultant for clients as prestigious as the US government and as well-known as Microsoft. He used those years of experience as a criminal to show others how to defend themselves against digital intrusions. According to CNBC, he has three important strategies for anyone interested in better cybersecurity.

Disciplined Password Management For CyberSecurity

For anyone that is still relying on passwords, while it may be inconvenient, the best way to increase security while still using these systems is to use “strong passwords.” Strong passwords are random strings of alphanumeric characters, making them impossible to guess.

The best way to handle multiple strong passwords is to use a password management system. Relying on an easy-to-remember or guess password or using the same strong password repeatedly leaves the user vulnerable to password theft.

Upgrade To NextLevel Multi-Factor Authentication

For those who want to take things a step further, switching to multi-factor authentication systems adds extra security layers. Traditional passwords have only one point of access. Producing the correct password grants total access. Multi-factor, as the name implies, adds additional layers of verification.

Multi-factor authentication can use additional variables, such as requiring an extra code inputted that is sent via text over a phone. Or it can eliminate passwords and codes, relying on biometrics such as voice, face, or fingerprint recognition and encrypted passkeys tied to a specific device such as a phone or laptop.

Isolated Devices

For the ultimate in security, a final tip, specifically relating to financial or other confidential data, is investing in specific devices used only for that purpose. This means buying a phone, tablet, laptop, or desktop computer and using only that device to access financial data, store confidential data, or even exclusively log into financial or confidential accounts on these devices.

While this is a more drastic method, having dedicated devices for protected data increases security by 98%. If these devices are never used for everyday computing activity and only ever activated and utilized for important data-related interactions, the odds of theft are dramatically lower. However, this does require more time and investment.

For most people, the more practical system is upgrading cybersecurity to a multi-factor authentication system, such as the standardized protocols used and offered by the FIDO alliance. If you’re interested in using the FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Read more
22 Nov
3 Min read

Nok Nok Now Provides Full Passkey Support

November 22, 2022 Nok Nok News Press Release 0 comments

Nok Nok, one of the founding partners in the FIDO Alliance, or “Fast IDentity Online,” is now announcing full support for passkeys to offer digital service providers an alternative to traditional password verification with safer, faster, passwordless authentication combined with passkeys.

Over 80% of successful digital intrusions result from password credential theft, either through sophisticated phishing techniques to steal passwords or personal secrets or user negligence in failing to use strong, secure passwords that are difficult to remember. With digital cyber crime accelerating, single password verification systems are becoming increasingly vulnerable as all it takes is one stolen password to assume significant or complete control of a customer’s system.

Passkeys As A Solution

Passkeys are a phishing-resistant replacement for passwords that provide faster, easier, and more secure sign-ins to websites and apps across a user’s devices. Unlike passwords, passkeys are resistant to phishing, are always strong, and are designed so that there are no shared secrets.  Different user authenticators can be used, such as various biometric factors like face or fingerprint identification, but this is also combined with additional authentication procedures, such as verifying encrypted keys on a personal device, such as a phone, for additional security.

For clients who already support FIDO, the technology behind passkeys, the Nok Nok S3 authentication platform now fully. supports single-device and multi-device passkeys and requires no code changes. For clients who do no already support FIDO, the Nok Nok S3 suite provides passkey support for both single-device and multi-device passkeys on one authentication infrastructure. Integrating passkeys not only makes user registration and sign-in more secure but also makes them faster and less prone to error and frustration.

Improving User Experiences

Because of the ease of passwordless authentication based on passkeys, businesses have found that passkey sign-in dramatically reduces user friction during sign-in while also reducing credential theft from phishing attacks since there are no shared secrets with passkeys. Passkeys are the next-level multi-factor authentication designed to replace passwords. Even though a typical “strong password” is possible with a long string of random alphanumeric characters, these passwords are harder to remember and they still require a second authentication factor such as SMS or email of passcodes.  Passkeys do away with passwords and the need for a second code for authentication (two factor authentication). because the technology behind passkeys provides multi-factor authentication in one simple, user step.

Passwordless authentication with passkeys offer a 99.5% sign-in success rate and typically speeds up the sign-in process for users by anywhere from 100-200%. This means fewer sign-in failures, less frustration, and perhaps most importantly, people not abandoning a service because they find the traditional multifactor authentication process too restrictive, demanding, and inconvenient. Thus, they switch to another service that treats them better.

These initiatives by the FIDO alliance continue to provide more security to businesses and their data, with more convenience and speed for customers. Do you need to learn more about FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Read more
01 Nov
3 Min read

Banks Are Looking More Closely Into Passkey Security Systems

November 1, 2022 Nok Nok News Industry News 0 comments

Since the dawn of business, banking has been one of the services that have required the most security. Whether preventing physical cash from being robbed or ensuring that cheques are legitimate, banking relies on trust and security to facilitate financial transactions.

Now, in a digital age, where identity theft is an ongoing concern, the traditional password system is losing its luster, and more banks are turning to more advanced security systems like passkeys.

What Is A Passkey?

A traditional password is a single security point. If a user knows the required password and inputs it correctly, access is granted to a device or account. A passkey is a multifactor authentication system that uses more than one means of verification. Passkeys are password free, usually requiring a device such as a smartphone or a laptop to act as a primary interface and Bluetooth proxy when needed. This means that a user will first access their phone using different means, such as facial recognition, a fingerprint, voice recognition, PIN, or even a swipe pattern to validate their device. 

Once this is done, the device then uses additional verification through a Bluetooth connection that sends a unique “public key” to the account associated with that device and matches it with a “private key.” This portion of the verification is done automatically, with no additional actions required from the user. Once the keys have confirmed validity, the user may now access the account from that device. If the user needs to use another device, the QR code is required to transfer verification processes to that new device instead of using the primary one.

More Safety

The convenience and security of a passkey system is an effective alternative to traditional password systems. Groups like the Fast Identity Online or FIDO alliance have worked closely with major technology companies such as Apple and Google to integrate the standards and protocols for passkey systems and make multifactor authentication an easier and more secure means of securing data. 

The use of more than one verification system, combined with password-free authentication systems like biometrics, means users no longer have to memorize long, difficult strings of random alphanumeric characters. Storing the biometric data on a device such as a phone or a laptop also ensures that the data itself remains private and the credentials can’t be stolen online. If you’re interested in passkey systems for agile, increased security integrating a more convenient password-free verification system using FIDO standards, read here to learn more.

Read more
25 Oct
3 Min read

More Banks & Credit Cards Are Using Biometrics

October 25, 2022 Nok Nok News passwordless authentication 0 comments

Thanks to the efforts of the FIDO alliance and big businesses such as Google and Apple, passwordless authentication is growing in the world of banking and credit card transactions. Biometric features are increasingly found to be fast, safe, efficient, and more secure for users, though some factors are still being addressed.

Global Adoption

Ironically, despite the United States’ reputation for developing cutting-edge technology, the American public often is slower to adopt new technologies and techniques compared to the rest of the world. For example, Alipay was one of the earliest vendors to introduce facial biometric payment in China. As a result of this early implementation, payment using facial biometrics is ahead of the curve in China compared to the United States. However, part of the reason for the slower uptake in the United States is cultural factors. Whereas Chinese shoppers don’t worry too much about whether facial biometrics are an invasion of privacy, American shoppers do and thus express reluctance. Conversely, American shoppers seem more comfortable with a fingerprint biometric than many other countries.

Another issue is trust and regulation. Europe is generally regarded as a harsher, more regulated, and thus “safer” transactional environment. So the thinking is that if biometric transactions meet the stringent demands of European Union financial regulations, that will mean they more easily exceed the safety and privacy requirements that would be in place in the United States.

Devices Matter

One of the most promising approaches for banking and credit card transactions has been using mobile devices for verification and authentication. There are multiple reasons this solution is popular, not the least of which is the ubiquity of such personal mobile devices in most of the population. However, the other advantage of this is that biometric authentication can remain private.

In this solution, biometrics and the data required for authentication remain on the phone and not in some online database where a breach would result in the theft of private information. Instead, once someone’s biometrics have been confirmed, the mobile device itself is considered authenticated. It can communicate with other networks, using a multifactor authentication system, of which biometrics is merely one link in the chain but the easiest one for people to use, while other factors handle the “heavy lifting” in the background. All of this is part of the initiatives employed by the FIDO alliance to make things easier. If you’re interested in using the FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Read more
18 Oct
3 Min read

Telephone Companies Find Value In The Zero Trust Security Concept

October 18, 2022 Nok Nok News Industry News 0 comments

The United States relies increasingly on mobile devices like smartphones to send and receive data, and this meant that a need for wireless data transmission similar in volume to wired Internet connections has come into greater demand. The result is that the 5G wireless network, the latest, fastest, and largest data transmission standard, continues. The largest telecommunications companies, such as Verizon and AT&T, continue their rollout, with an estimated coverage of 175 and 100 customers. However, this also means that more security will also be required as more data is transmitted across 5G networks. And zero trust policies, with convenient password-free authentication systems, will be critical to this success.

What Is Zero Trust?

As the name implies, “zero trust” security means making no assumptions about the validity of a person or device attempting to access data and requiring multiple stages of verification and authentication throughout every step of login and transaction. This has become even more prevalent in recent years as the pandemic forced many companies to keep workers at home, using home devices, and in some cases, even their own smart devices, to remotely access data. This meant that some of the usual trust mechanics, such as knowing a valid user was correctly accessing the network because they could be physically seen at their desk, on their office computer, accessing data locally stored on that device, could no longer be taken as givens. Now, workers needed to be able to access data remotely from any number of locations and devices, making authentication of legitimate users a priority.

One of the hallmarks of zero trust protocol is constant verification. It is not enough to accept a password of biometric authentication once and then turn a blind eye to whatever that user does for the remainder of the transaction period. Verification is an ongoing process for different actions; thus, password-free authentication systems are important in streamlining this process.

Another important aspect of the zero trust approach is “limiting the blast radius.” A security protocol is extremely vulnerable if it assumes no breach will ever happen and thus has no contingencies in place if one occurs. Zero trust protocols take breaches of some kind as a given and compartmentalize access and activities so that even if a breach occurs, it can be quickly contained and quarantined, rather than allowing a single breach to gain complete, centralized control of an entire system.

If you are interested in zero trust security concepts and incorporating FIDO protocol into a password-free authentication system, read here to learn more.

Read more
11 Oct
3 Min read

Transitioning To Passwordless Authentication Easier Than Ever

October 11, 2022 Nok Nok News Industry News 0 comments

While passwords and knowledge-based access (KBA) were once the herald of cybersecurity, the evolution of technology and the proliferation of digital connectivity are slowly making passwords a thing of the past. Passwords have become a nuisance for both users, employees and IT personnel, causing frustration as users struggle to remember passwords that they need to update regularly, while costing organizations millions of dollars in OPEX and lost productivity and revenue during password recovery and resets – both behind and outside the enterprise perimeter. Passwordless authentication can help avoid this.

4 Tips For A Frictionless Transition To Passwordless Authentication

NokNok Inc has been a pioneer of passwordless authentication, encouraging organizations and enterprises to shift to improve their cybersecurity. Plenty of enterprises have started to invest in passwordless authentication but this transition can be challenging. The following tips can help for a smoother enterprise transition for everyone involved.

Manage Passwords As Best As You Can

Don’t rush the transition. If your organization must use passwords for the next few years, simply do your best to keep passwords safe. Password managers continue to be funded and enterprise versions can help prevent password loss while keeping passwords safe. Password managers offerempowering features that help employees create unique and complex passwords without the fear of forgetting them . Many offer extensive support for both web and mobile app authentication as well – including web browsers.

Multifactor Authentication Is Important

Multifactor authentication (MFA) is a great way to ease employees into passwordless technology. MFA is the next natural step for enterprises who cannot entirely shift users and employees to passwordless yet. Most passwordless platforms can be integrated into existing security infrastructure and can offer MFA combined with modern biometric authentication since most devices already offer native biometric features.

Use True SSO To Centralize Authentication

True SSO is another step that can ease the transition to passwordless authentication while improving security. True single sign-on (SSO), offered in the cloud, allows users to log on to devices and platforms using only a single set of access credentials. Modern passwordless systems also provide wide support for SSO infrastructure.

Be Realistic With Passwordless Authentication

While passwordless is definitely the future and now here to stay, it will likely take many more years before the world’s digital services become fully passwordless. Don’t expect your entire organization or your customer base to go fully passwordless in a matter of years because many are still not comfortable with biometric-based authentication. Be realistic about the changes that you can make because it is fully possible to improve security with a move toward passwordless authentication without burdening IT departments with sudden changes to their security infrastructure.  Most enterprise infrastructures and the complex ecosystems with which they are connected, are still entirely based on password and KBA. Digital transformation projects can last years to finish migration.

Nok Nok Inc offers a range of passwordless authentication, payments and transaction verification feature that meet your organization’s B2C passwordless needs where you are. We support for and integration with existing multifactor authentication for customers who are not yet ready to entirely adopt biometric-based passwordless authentication. Organizations who have shifted to our services saw 50% reduction in customer onboarding time and a staggering 78% increase in sign in customer sign-inspeed. Harness the phishing-resistant customer security offered by NokNok’s passwordless technologies. Learn more about Nok Nok Inc’s products here.

Read more
04 Oct
3 Min read

Blockchain Vulnerabilities Have Cost More Than A Billion

October 4, 2022 Nok Nok News Industry News 0 comments

2022 has been a tough year for crypto investors as blockchain platforms have been targeted by cyber attackers left and right. A total of $1.4 billion has been lost due to these attacks. Ronin, a bridge that supports Axie Infinity, has lost $615 million; Wormhole, a bridge backed by Jump Trading, lost $320 million; Horizon, a bridge by Harmony, lost $100 million; and around $200 million was stolen from Nomad.

How Were Blockchain Networks Hacked?

Cyberattackers exploit vulnerabilities in blockchain technology, specifically blockchain bridges and humans. Blockchain bridges are a type of software through which people send out tokens from one blockchain network to another. Bridges, being the piece of code that enables smart contracts to execute without human intervention, typically hold large values being transferred from one network to another. Without adequate security, these bridges are easy targets.

Although transactions must first be approved by validators to become successful, hackers are able to manipulate validators into handing over their private keys or compromise only a few accounts to withdraw funds. Bridges are central to blockchain technology, which is why their increased vulnerability is a major cause for concern.

Another way hackers steal funds is through human vulnerability. Some rely on social engineering tricks to convince a victim to send funds to them. Another method is by simply stealing cryptographic keys or private digital signatures, the access for which they gain  through apps, wallets, and other third-party vendors that authenticate users to their digital services via legacy authentication. In other words, password-based authentication.

Eliminating The Human Risk Factor With Passwordless Authentication

Cryptocurrencies are continuously expanding, and blockchain technology grows with it. Despite the advanced technology with which blockchain technologies operate, cybercriminals are still able to find ways in through something as basic as a password login.

Passwords have long been a favorite vulnerability of cyber attackers. Both methods used by cyberattackers of blockchain networks succeeded through compromised phishing and man-in-the-middle attacks resulting in stolen passwords. With the increased interconnectedness of systems nowadays, even a technology as sophisticated and secure as decentralized blockchain requires strong, passwordless authentication,  because of its distributed access.

Unphishable, key-based passwordless authentication is one way to elevate the security for blockchain networks across all platforms, especially third party applications. Nok Nok Inc, along with the global industry group (FIDO Alliance) they founded are on a mission to reduce people’s reliance on extremely vulnerable legacy password and knowledge-based system access.

Passwordless authentication is a possession-based and biometric authentication technique that relies on public-private cryptography. It generates a public-private key pair—the public key is shared with a service while the private key remains safe in the user’s device, protected by a PIN or biometrics. This system is incredibly convenient for end-users, as well as safe.

You can strengthen your cybersecurity with Nok Nok’s passwordless authentication system. To learn more about Nok Nok Inc’s industry-leading FIDO platform, contact us here.

Read more
  • 1…45678…12

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Latest Posts

  • OneSpan Accelerates FIDO Leadership With Acquisition Of Nok Nok Labs
  • Protecting Critical Healthcare Data Requires Strong Leadership
  • World Password Day: Time to Ditch Passwords for Good?
  • Verizon 2025 DBIR: Credential Attacks Still Dominate – A Nok Nok Perspective

Navigation

  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Request a Demo
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required

[mc4wp_form id=”18773″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18790″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18789″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18788″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18787″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18786″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18785″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18784″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18783″]

MUFG-800×600

“Transactions using mobile devices are rapidly spreading and it is essential to support both usability and security. By combining Hitachi’s abundant system development capabilities and know-how in the financial system and security related fields, and Nok Nok’s globally deployed and proven FIDO certified products, we achieved this compatibility, which led to this adoption.”

– Mr. Nobuo Nagaarashi, General Manager, Financial Information Systems 1st Division, Hitachi, Ltd.

 

The M in MUFG stands for Mitsubishi, which is a combination of the words mitsu and hishi. Mitsu means three. Hishi means water chestnut, and the word denotes a rhombus or diamond shape.  In partnership with Hitachi, MUFG has enabled passwordless authentication solutions across many of the bank’s apps and services.

Coverage In The Paypers
Coverage In Finextra
intuit

“As an early adopter of FIDO, we’ve seen significant business benefits and are completely on board with continuing to leverage the latest FIDO innovations with our partner, Nok Nok.”

– Rakan Khalid, Group Product Manager, Identity.

 

Intuit has delivered passwordless authentication across mobile applications and devices using Nok Nok’s S3 Suite. The results have reduced customer friction in their Intuit application experience.

Read The Nok Nok Intuit Case Study
Watch the FIDO Alliance Webinar: The Right Mix
Watch Marcio Mello discuss Intuit’s Nok Nok implementation at Identiverse 2019:
docomo-800×600

“DOCOMO is a worldwide innovator in providing its millions of customers with simple and strong authentication backed by a standards-based approach.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

As one of Nok Nok’s earliest customers, NTT DOCOMO became the first carrier to offer a billing system that is enabled by FIDO, the first to offer a federated Identity system integrated FIDO, and was the first to offer a mobile device that authenticates via the iris biometric modality.

Coverage In Find Biometrics
Coverage In Telecompaper
bbva-800×600-2

“Traditionally, one of the biggest challenges of authentication systems has been to balance security with user experience. Due to the FIDO standard, we are confident that both elements work together seamlessly to provide customers with the highest security standards, along with a transparent and agile user experience.”

– Juan Francisco Losa, Global Technology & Information Security Officer.

Nok Nok partnered with banking leader, BBVA to improve the security and user experience of the bank’s mobile banking services through state-of-the-art biometric capabilities.

Coverage In American Banker
Coverage In Planet Biometrics
Softbank-800×600-1

“We can no longer rely on passwords for our financial or other sensitive transactions as they are weak, forgotten and easily hacked. We are very pleased with SoftBank’s decision to choose our standards-based authentication platform for their millions of customers.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

Millions of SoftBank’s mobile subscribers now have the ability to use biometrics for authentication through the mobile application “My SoftBank Plus”. With this implementation, SoftBank’s mobile users access data with the My SoftBank service using biometrics for a frictionless, simple and fast authentication experience.

Coverage In Mobile ID World
Coverage In Planet Biometrics
Coverage In The Paypers
Aflac-Japan-800×600-1

“Aflac is the first Japanese insurance provider to deploy a FIDO-certified solution, and we would like to continue collaborating with Nok Nok Labs to introduce it to banks, insurance industry and other industries.”

– Michihiko Ejiri, VP, Head of Portal Service Division, Service Technology Unit, Fujitsu Limited.

With the Nok Nok S3 Suite, Fujitsu has provided Aflac customers with strong authentication to their mobile claims payment application using any biometrics on their iOS and Android devices. The solution also provides Aflac and their customers with a scalable method to authenticate users that is interoperable with their existing security environments and reduces or eliminates the reliance on usernames and passwords.

Coverage In Find Biometrics
Coverage In Find Authority
lichtenstein-800×600-1

“For our customers, we only use the most secure products on the market that meet their requirements. Nok Nok perfectly aligns within our product portfolio and we are proud of the very trusted partnership.”

– Lukas Praml, CEO of YOUNIQX.

 

YOUNIQX Identity AG, the award-winning subsidiary of the Austrian State Printing House (OeSD) and Nok Nok partnered to deliver a electronic identity system (eID) for the citizens of the country of Liechtenstein.  This deployment represents the first time that Nok Nok’s FIDO platform has been used to deliver an eID.

FUN FACT
As of 2009 Liechtenstein’s per capita income was $139,100, the highest of any country in the world.

Learn How FIDO Supports EIDAS Regulation
Coverage In Mobile ID World
Coverage In The Paypers
Coverage In Biometric Update
Gallagher-800×600-1

“Nok Nok’s state-of-the-art, standards-based platform will deliver a tremendous user experience,”

– Steve Bell, Chief Technology Officer at Gallagher

When a horse called Joe took too much of a liking to using a car as a scratching post, owner Bill Gallagher Sr. devised a cunning electrical circuit that delivered a shock whenever the horse rocked the vehicle, and in doing so created a company.  Today, with passwordless authentication from Nok Nok, Gallagher is leading the IoT industry with innovative solutions that work in your office and in the outback.

Coverage In Biometric Update
Coverage In Mobile ID World
Coverage In Planet Biometrics
tmobile-800×600-1

“Our Forgot Password flows were running at about 65%. After we rolled out FIDO by Nok Nok, our forgot passwords dropped to 7%.”

Michael Engan, T-Mobile

 

Using the Nok Nok S3 Suite, T-Mobile has become a leader in carrier adoption of passwordless authentication. Their solutions have reduced forgotten passwords and dramatically improved customer satisfaction.

Watch Michael Engan from T-Mobile talk about their implementation of Nok Nok’s S3 Authentication Suite at Identiverse 2019.

  • 日本語