• Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Partners
    • Clients
    • Blog
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Partners
    • Clients
    • Blog
    • Support Services
Nok Nok
Nok Nok News

Nok Nok News

09 Aug
3 Min read

The Passkey Is A New Standard In Security

August 9, 2022 Nok Nok News Industry News 0 comments

In the past, the traditional forms of digital security consisted of a single password for authentication. While convenient in that single passwords are easy to implement and verify, this system was also vulnerable and even inconvenient in other ways. Those vulnerabilities are becoming more apparent as companies move to cloud-based computing and applications, but fortunately, there is a solution like passwordless authentication.

The Password Problems

First, there is the issue with passwords themselves. The weakest security protocol right now is a single-password system because it means that stealing or guessing a password, complete access to data, or complete control of an account is a given. One workaround is to use “strong” passwords that are long, random strings of alphanumeric characters, making them hard for users to remember. So some, due to “password fatigue,” ignore this guidance for convenience. The other solution is to have many passwords to handle different aspects of a system, but due to the number and complexity of passwords, this often requires a passkey manager, which adds an extra layer of interference.

This has resulted in predictable ways to steal passwords. 80% of the data breaches that occur are usually the result of either “phishing,” which tricks users into volunteering passwords through fake emails, phone calls, or other forms of social engineering, or man-in-the-middle attack, which involves spying on a user and monitoring their access activities to steal passwords when they type them in.

The Passkey Arrives For Passwordless Authentication

The passkey concept is a comparatively new idea in digital security, but it brings a lot of promise for passwordless authentication. It is a feature being implemented by companies like Apple, Google, and Microsoft in collaboration with the FIDO alliance that creates strong, cryptographic keys generated for you for easy passwordless authentication. Users that find apps that accept passkeys can have passkeys created for every username or account. That passkey is automatically entered with just one touch, similar to the autofill or auto-correct functions for text entry.

The system even allows people to log in to other devices that don’t have a user’s account or passkey system present. All it takes is activating the passkey feature that then creates a QR code that a user’s phone scans so the passkey on the phone can verify and authenticate everything. It’s just one more way that security is working on more durable systems that can eliminate phishing and man-in-the-middle attacks while making passwordless authentication simple and easy for people to use. If you’re interested in using the FIDO protocol and moving to a password-free system, read here to learn more.

Read more
26 Jul
3 Min read

New Masterclass On The Costs Of Authentication Failures

July 26, 2022 Nok Nok News Industry News 0 comments

Through its own primary research, Nok Nok has been aware that limited business data exists about the state of today’s system-level authentication processes and its relation to the business impact of authentication failures. As the first initiative of its kind to address this gap, the Ponemon Institute, working with Nok Nok, launched an industry survey of businesses with current digital transformation projects underway.

The key finding of this Ponemon Study is that there exists a gap between IT security and line of business managers in understanding the various risks and impacts facing their organizations from authentication failures. 

Learn The Costs Of Authentication

This is one of the major takeaways from a study called “The Costs of Authentication Failure and Negligence,” conducted last summer by the Ponemon Institute for Nok Nok. According to this research where more than 1,000 corporate participants were interviewed,  it’s not just a customer inconvenience that arises from authentication failures. Organizations are spending on average $3M annually on these failures and the maximum single loss ranges from $39M to $42M. 

These losses include costs associated with downtime and business disruptions while security teams resolved various issues, loss of customers and the lingering effects of poor brand perception. On a corporate scale, the severity of system-level failures grows enormously. It’s one thing if one customer can’t remember a password, but quite another thing if many can’t. Similarly, one person with a seized account or data held for ransom is bad, but an entire organization is catastrophic. The most common reason for these breaches is authentication failures, such as clients taking their business elsewhere due to being unable to remember password guidance or simply being unwilling to comply and going to an organization that offers more convenient but less secure protocols.

This masterclass is hosted by Nok Nok and presented by various experts in the industry, including:

Larry Ponemon, Founder & Chair Ponemon Institute

Phil Dunkelberger, President & CEO, Nok Nok Labs

Jim Delli Santi, VP Marketing & Strategic Initiatives, Nok Nok Labs

Video: Patients and their Medical Data Deserve Robust Protection

Close to half of those surveyed agreed that authentication failures represent a significant security challenge for their companies, and preventing these failures is difficult because today’s MFA solutions negatively impact user experience. And sadly, more than 60% of the respondents detect more than ten monthly authentication failures, with an average downtime experienced by the respondents with these failures is about six hours a month. 

There are several reasons for authentication failures, according to the survey respondents. 

First, criminals using stolen credentials are hard to identify and distinguish from actual employees. Only 13% of the respondents said that it was either easy or not difficult to find the miscreants. About a third of the respondents say their companies have good visibility into credential theft attacks. The survey considered thefts of the user’s actual password rather than random guesses, using that account to make fraudulent purchases or other transactions, and steal confidential data. 

Second, only 19% feel that they have a high level of control over their authentication processes. Next, a total of 33% think that more than half of these failures remain undetected, and two-thirds claimed that the frequency (and 55% for the severity) of these failures has increased in the past year. 

Sign up for the masterclass to gain even more valuable insights about the costs of authentication failures. If you’re interested in learning about the FIDO protocol and moving to a password-free system, read here to learn more.

Read more
19 Jul
3 Min read

Apple’s Newest OS Is More Convenient & More Secure

July 19, 2022 Nok Nok News Industry News 0 comments

Apple, the ever-popular alternative to PC-based systems, has announced a slew of new features for its latest operating system update, macOS Ventura. The newest upgrade expands the convenience and functionality of Mac computers for users and introduces many more ways to secure data and devices with passwordless authentication.

Multi-Task Management

For users that need to hop back and forth between different windows on different applications and software, “Stage Manager” is one of the tweaks that can help users to stay focused and on track. Now the primary software being used is displayed as a centralized window, but others that are also “in play” at the moment appear as secondary windows on the side for easier access.

Mail has also been overhauled, with a big upgrade to organization and search features. Email contacts, mail itself, or even specific attached documents or photos can be easily retrieved now. Users can even set reminders to reply to or revisit certain emails within a specified period.

Device Interconnectivity

The new OS is also specifically designed to recognize the presence of an iPhone, even wirelessly. “Camera Continuity” is a new feature that allows macOS Ventura to use an iPhone as a web camera and can connect wirelessly to these devices for use. Users can mount their iPhones on their computer or continue to go handheld as they prefer, with smart features that can dim light or accentuate facial features.

Cybersecurity With Passwordless Authentication

Perhaps most importantly, macOS Ventura has new security features that make device usage safer than ever. Safari browser users can now enjoy a passwordless authentication feature called “passkeys.” Passkeys are digital keys that remain local to a specific device. These passkeys can only be unlocked through different passwordless authentication features based on user availability or preference.

Apple already has different forms of passwordless authentication for users to employ based on biometrics. So whether it is Touch ID or Face ID, users don’t have to worry about memorizing a long, difficult string of random alphanumerics. iCloud Keychain allows this same security to sync across devices like a Mac, iPhone, iPad, or Apple TV, with end-to-end encryption. This security even extends to other non-Apple websites, apps, or even non-Apple devices using an iPhone. 

These steps bring Apple users one step closer to an even safer digital experience that strongly repels attempts at identity theft without requiring inconvenient steps or measures to be taken. If you’re interested in using the FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Read more
12 Jul
3 Min read

Biometric Transactions Set To Soar Over The Next 5 Years

July 12, 2022 Nok Nok News Industry News 0 comments

Biometrics is a form of password-free authentication that, instead of relying on typing out a memorized word or phrase, uses unique personal characteristics to confirm identities, such as the face, the voice, or even a fingerprint such as a thumb. Biometrics have slowly integrated into financial transactions, and a new study indicates that this trend is set to grow explosively.

Biometric Banking

According to Juniper Research, financial transactions through biometric authentications are set to exceed one trillion dollars by 2027. When it comes to remote payments, especially through mobile devices, PIN numbers and passwords are still dominant; with biometrics slowly integrating into mobile devices like smartphones and tablets, the current transaction amount is estimated to be approximately $332 billion.

This means that if the Juniper Research estimates are correct, remote payments through the use of biometrics are expected to rise by about 365% within the next five years.

Growth By Necessity

There are several reasons that this growth in biometrics is occurring. The chief driver is convenience. Biometrics is fast and easy. It doesn’t require a person to memorize a long string of random alphanumeric characters just to have a “strong” password. That ease is being capitalized on by large technology companies, such as Apple, that incorporate biometrics into financial software such as Apple Pay, making it an easily accessible, easy-to-use payment alternative for Apple users.

The other factor is government intervention. The European Union, for example, has a “Second Payment Services Directive” (PSD2) that is putting a renewed emphasis on cybersecurity. Strong Customer Authentication, or SCA, is a part of this directive, and that also means multi-factor authentication that doesn’t rely solely on a password for access. Biometrics is an important component in meeting these standards.

Another factor contributing to the wider implementation of biometrics is FIDO, or the Fast Identity Online alliance. Formed in 2013, this alliance of industry experts is committed to reducing the reliance on passwords and promoting a standardized protocol.

FIDO recently got a shot in the arm with an official announcement from major tech companies Microsoft, Apple, and Google, all announcing broad support for FIDO standards, with an intention to make them more widespread in technology. That initiative is going into deployment as quickly as next year and will continue to become more widespread.

Biometrics is a fast, secure, and more convenient way to authenticate without using passwords. If you’re interested in using the FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Read more
05 Jul
3 Min read

All The Major Technology Companies Adopt The FIDO Standard

July 5, 2022 Nok Nok News Company News, FIDO Alliance 0 comments
fido standard
Read more
23 Jun
3 Min read

Learn More About Passwordless Authentication With This Master Class

June 23, 2022 Nok Nok News Webinar 0 comments
REGISTER

More businesses are seeing both the convenience and cost benefits of integrating devices and data and cloud-based application and storage systems. After all, if an employee working abroad needs to access data, it’s more efficient to be able to do so from a smartphone with access to an online database than it would be for that employee to have to return to the home office and access the data from their own desktop computer. However, this convenience means that there needs to be more consideration for cybersecurity, which can be a serious vulnerability for many companies.

If you’d like to learn more about how authentication failures affect businesses and how passwordless authentication can overcome these challenges, register for a free Live Masterclass Webinar: 

Topic: The Cost Of Password Authentication Failures

Day: Tuesday, June 28

Time: 2:00 pm, EDT

Topic: The Cost Of Password Authentication Failures

Panelists: 

Jim Delli Santi: VP Marketing/Strategy Nok Nok Labs

Phil Dunkelberger: President/CEO Nok Nok Labs

Larry Ponemon: Founder/Chairman Ponemon Institute

Attend this webinar and learn to balance strong security with ease of accessibility.

Older Security Is Vulnerable Security

Cybersecurity is only as robust as the people willing to follow its guidelines, which is where passwords, one of the oldest security measures, can fail. Current recommendations for passwords are that they are “strong,” which often means a long string of 8-16 randomly selected alphanumeric characters, making it almost statistically impossible to guess.

However, this recommendation can be difficult to follow since it also means passwords that are challenging to remember. Some will ignore the guidance in favor of easy-to-remember passwords, such as names, phrases, or other mnemonic triggers, which are also easy to guess.

Disruptive Consequences

Authentication disruption can occur on both sides of a business. A client or customer that ignores protocol can have weak passwords stolen or compromised. This can result in losing account control, sometimes funds, and eventually, trust in the company.

However, enforcing a strong password protocol can also result in customer loss. Hard-to-remember strong passwords can sometimes result in multiple log-in failures or even be so difficult they discourage clients and convince them to take their business elsewhere where protocols are less stringent and more vulnerable.

The Financial Consequences

Another area where cybersecurity disruptions can have a significant negative impact is work efficiency. Disruptions can be as minor as a build-up of inefficiencies or outright failure due to security disruptions. On the most extreme end, however, criminal activity like “ransomware” can lock users out of their data until money is paid to the hackers to revert control.

REGISTER
Read more
21 Jun
3 Min read

Consumers Want to Secure Personal Finances In A Simpler Way

June 21, 2022 Nok Nok News Industry News 0 comments

Personal finances are more accessible than they’ve ever been. The average consumer has now gone from being limited to using a bank branch when it’s open, to using automated teller machines 24/7 at specific locations, or accessing bank accounts at home on a computer or on the go with a mobile device such as a phone or tablet. However, ensuring that a customer’s money is safe has required more stringent security measures. This is where things can get complicated unless better, more convenient measures like modern biometric authentication are implemented.

Protecting Money

Accessing bank accounts in the past required visiting a bank branch and filling out forms while presenting bank books and other documents that verified identity. However, in the digital world, the mainstay for accessing personal finances has been the password. According to PYMNTS.com, 64% of people who access their financial data do so using a traditional username/password combination at least once a month.

Unfortunately, passwords can be an extremely weak form of security, depending on the individual choice. Through ignorance or neglect, some people choose passwords that are easy to guess, leaving their financial data vulnerable to unauthorized access. The solution is to use a “strong password” and username, which typically consists of long strings of random alphanumeric combinations to make guessing impossible. Unfortunately, this also makes the passwords extremely difficult to remember, making this method incredibly inconvenient.

Making Things Easier

This is where FIDO biometric authentication methods can have a huge impact. According to PYMNTS.com, over 60% of consumers surveyed are willing to try a system other than traditional username/password mechanics. This jumps to over 73% for consumers who access online financial services across multiple mobile devices.

Biometric authentication, rather than memorization of a username and password, uses the individual’s unique characteristics that can’t be exploited through guessing. Those characteristics may be the face, fingerprints, voice identification, or other factors. However, the key feature is that a face can’t be “guessed.” Just because a thief may know what a person looks like, that knowledge doesn’t help them access a system that requires a person’s face. When combined with other mechanisms, such as USB encrypted keys, or multiple forms of biometric confirmation, this can form a multifactor authentication system that is faster than inputting a username and password and more convenient since it doesn’t require memorization.

As more and more people move to a model of accessing data across multiple platforms and devices, better, faster, stronger security systems are needed.

If you’re interested in using the FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Read more
14 Jun
2 Min read

Dr. Rolf Lindemann at Authenticate Summit

June 14, 2022 Nok Nok News Company News, FIDO Alliance, Webinar 0 comments
Dr. Rolf Lindemann at Authenticate Summit
Read more
07 Jun
3 Min read

Log4Shell Has Created A Serious Vulnerability In The World Of Java Software

June 7, 2022 Nok Nok News Industry News 0 comments

Certain types of software are ubiquitous. Microsoft Windows is found on millions of computers worldwide, while Google Chrome is the preferred default search engine for many people. The Java programming language is another such digital tool that has been widely used in everything from mobile software to web-based applications and even middleware that many businesses rely on. Unfortunately, this very ubiquity with software can work against itself in some cases, and cyber security is one of them. A major vulnerability has been discovered in the Log4J logging utility, a favorite of Java developers.

What Is Log4J?

The Log4J utility is one of the most popular developer tools in the Java software world. It is a Java-based, open-source logging utility. It can be programmed to track and report “events,” such as errors so that developers can monitor and eventually address flaws in software. Because of its ease and usefulness, the Log4J utility has been embedded in a huge range of different software, especially for the hundreds of millions of mobile devices in which this embedded software is present.

Unfortunately, a vulnerability has been found in the Log4J utility and because Log4J is so ubiquitous, this has created a severe cybersecurity threat.

Significant Loss Of Control In Cyber Security

The Log4Shell vulnerability has been given a common vulnerability score of 10, which is the most severe designation in terms of threat. Specific examples of exploitation with this cyber security vulnerability include DDOS attacks, remote seizure, control and execution of applications, auctioning access to corporate networks to the highest criminal bidder, and even partitioning of digital resources in a network for the mining of cryptocurrency.

Why It Happens

The Log4Shell vulnerability is the latest example of the struggle between cost and safety. The most cost-efficient approach in software is to use existing resources, sometimes even older ones, rather than internally creating a unique, bespoke solution. However, while this lowers costs, older applications and processes also tend to be more vulnerable compared to the newest application or tool, which, while more expensive, is also far more resistant. Every company wrestles with how much is too much to spend on security.

Now companies are scrambling to identify, address and patch this vulnerability, but it showcases the ongoing need to maintain modernized security measures. New software, new upgrades, and new user control systems such as passwordless identity and authentication reduce the chance of a critical vulnerability being found and exploited because modern passkeys offer phishing resistant, user-centric security.

If you’re interested in using the FIDO protocol and moving to a passwordless identity and authentication system, read here to learn more.

Read more
02 Jun
3 Min read

It’s Not Enough To Have Good Security; You Need Good People Too

June 2, 2022 Nok Nok News Industry News 0 comments

In recent years there has been a renewed interest in augmenting digital security. The use of biometrics and other forms of passwordless authentication are making great strides in helping end-users maintain a safer, more secure environment.

However, it’s not just the users that are crucial to maintaining a secure digital environment. Experts and other qualified digital security staff are essential, and this is becoming a serious problem in the United States.

Demand Outstrips Supply

The United States is currently estimated to have one million Americans working in the digital security field. However, there are also approximately 600,000 vacancies that require urgent filling, and over 500,000 of those are in the private sector alone. According to Forbes, 45% of companies with digital security teams report shortages that need qualified staff.

This can be viewed as a “seller’s market” for IT staff with security experience. The job demand is real, and companies must put in the work to appeal to security specialists and sway their decision to take a job and stay there. However, with so many shortages, there is already a domino effect at play.

Personnel Shortage Means Incomplete Work

Biometrics can only go so far. While a passwordless authentication system can make huge strides in protecting individual users, it should never be relied on as the sole security mechanism. Human expertise is still required, especially when integrating new security technologies into an existing framework.

This is where the shortage in qualified security personnel is at its most acute. Unless qualified personnel are present to work on systemic authentication issues or enterprise security problems within an organization, holistic solutions will not be delivered. In the realm of digital security, this means that system-wide vulnerabilities may go unaddressed due to a lack of skilled workers and their expertise, which together increase enterprise security risk. A lack of proper security staffing can result in a struggle to maintain compliance, with more vulnerabilities and systemic authentication failures that can slip past undetected.

People Matter to Security And Biometrics

It’s not just enough to want to maintain a secure business; there must be an investment in the people. Larger companies with the proper budgets must be willing to invest in a CISO but, more importantly, must be ready to support the needs of that CISO. If security isn’t working because the security staff isn’t getting the people and tools they need to do their work, it’s no surprise that their efforts fall short. Implementing effective and convenient security measures such as biometrics helps, but that’s only part of a coordinated effort.

If you’re interested in using the FIDO protocol and moving to a passwordless identity and authentication system, read here to learn more.

Read more
  • 1…678910…12

Latest Posts

  • Passkeys for E-commerce: A Game Changer Part 2
  • Passkeys for E-commerce: A Game Changer Part 1
  • OneSpan Accelerates FIDO Leadership With Acquisition Of Nok Nok Labs
  • Protecting Critical Healthcare Data Requires Strong Leadership

Navigation

  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Request a Demo
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required

[mc4wp_form id=”18773″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18790″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18789″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18788″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18787″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18786″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18785″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18784″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18783″]

MUFG-800×600

“Transactions using mobile devices are rapidly spreading and it is essential to support both usability and security. By combining Hitachi’s abundant system development capabilities and know-how in the financial system and security related fields, and Nok Nok’s globally deployed and proven FIDO certified products, we achieved this compatibility, which led to this adoption.”

– Mr. Nobuo Nagaarashi, General Manager, Financial Information Systems 1st Division, Hitachi, Ltd.

 

The M in MUFG stands for Mitsubishi, which is a combination of the words mitsu and hishi. Mitsu means three. Hishi means water chestnut, and the word denotes a rhombus or diamond shape.  In partnership with Hitachi, MUFG has enabled passwordless authentication solutions across many of the bank’s apps and services.

Coverage In The Paypers
Coverage In Finextra
intuit

“As an early adopter of FIDO, we’ve seen significant business benefits and are completely on board with continuing to leverage the latest FIDO innovations with our partner, Nok Nok.”

– Rakan Khalid, Group Product Manager, Identity.

 

Intuit has delivered passwordless authentication across mobile applications and devices using Nok Nok’s S3 Suite. The results have reduced customer friction in their Intuit application experience.

Read The Nok Nok Intuit Case Study
Watch the FIDO Alliance Webinar: The Right Mix
Watch Marcio Mello discuss Intuit’s Nok Nok implementation at Identiverse 2019:
docomo-800×600

“DOCOMO is a worldwide innovator in providing its millions of customers with simple and strong authentication backed by a standards-based approach.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

As one of Nok Nok’s earliest customers, NTT DOCOMO became the first carrier to offer a billing system that is enabled by FIDO, the first to offer a federated Identity system integrated FIDO, and was the first to offer a mobile device that authenticates via the iris biometric modality.

Coverage In Find Biometrics
Coverage In Telecompaper
bbva-800×600-2

“Traditionally, one of the biggest challenges of authentication systems has been to balance security with user experience. Due to the FIDO standard, we are confident that both elements work together seamlessly to provide customers with the highest security standards, along with a transparent and agile user experience.”

– Juan Francisco Losa, Global Technology & Information Security Officer.

Nok Nok partnered with banking leader, BBVA to improve the security and user experience of the bank’s mobile banking services through state-of-the-art biometric capabilities.

Coverage In American Banker
Coverage In Planet Biometrics
Softbank-800×600-1

“We can no longer rely on passwords for our financial or other sensitive transactions as they are weak, forgotten and easily hacked. We are very pleased with SoftBank’s decision to choose our standards-based authentication platform for their millions of customers.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

Millions of SoftBank’s mobile subscribers now have the ability to use biometrics for authentication through the mobile application “My SoftBank Plus”. With this implementation, SoftBank’s mobile users access data with the My SoftBank service using biometrics for a frictionless, simple and fast authentication experience.

Coverage In Mobile ID World
Coverage In Planet Biometrics
Coverage In The Paypers
Aflac-Japan-800×600-1

“Aflac is the first Japanese insurance provider to deploy a FIDO-certified solution, and we would like to continue collaborating with Nok Nok Labs to introduce it to banks, insurance industry and other industries.”

– Michihiko Ejiri, VP, Head of Portal Service Division, Service Technology Unit, Fujitsu Limited.

With the Nok Nok S3 Suite, Fujitsu has provided Aflac customers with strong authentication to their mobile claims payment application using any biometrics on their iOS and Android devices. The solution also provides Aflac and their customers with a scalable method to authenticate users that is interoperable with their existing security environments and reduces or eliminates the reliance on usernames and passwords.

Coverage In Find Biometrics
Coverage In Find Authority
lichtenstein-800×600-1

“For our customers, we only use the most secure products on the market that meet their requirements. Nok Nok perfectly aligns within our product portfolio and we are proud of the very trusted partnership.”

– Lukas Praml, CEO of YOUNIQX.

 

YOUNIQX Identity AG, the award-winning subsidiary of the Austrian State Printing House (OeSD) and Nok Nok partnered to deliver a electronic identity system (eID) for the citizens of the country of Liechtenstein.  This deployment represents the first time that Nok Nok’s FIDO platform has been used to deliver an eID.

FUN FACT
As of 2009 Liechtenstein’s per capita income was $139,100, the highest of any country in the world.

Learn How FIDO Supports EIDAS Regulation
Coverage In Mobile ID World
Coverage In The Paypers
Coverage In Biometric Update
Gallagher-800×600-1

“Nok Nok’s state-of-the-art, standards-based platform will deliver a tremendous user experience,”

– Steve Bell, Chief Technology Officer at Gallagher

When a horse called Joe took too much of a liking to using a car as a scratching post, owner Bill Gallagher Sr. devised a cunning electrical circuit that delivered a shock whenever the horse rocked the vehicle, and in doing so created a company.  Today, with passwordless authentication from Nok Nok, Gallagher is leading the IoT industry with innovative solutions that work in your office and in the outback.

Coverage In Biometric Update
Coverage In Mobile ID World
Coverage In Planet Biometrics
tmobile-800×600-1

“Our Forgot Password flows were running at about 65%. After we rolled out FIDO by Nok Nok, our forgot passwords dropped to 7%.”

Michael Engan, T-Mobile

 

Using the Nok Nok S3 Suite, T-Mobile has become a leader in carrier adoption of passwordless authentication. Their solutions have reduced forgotten passwords and dramatically improved customer satisfaction.

Watch Michael Engan from T-Mobile talk about their implementation of Nok Nok’s S3 Authentication Suite at Identiverse 2019.

  • 日本語