• Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
29 Apr
3 Min read

Cloud Computing Is The Latest Target Of Cybercrime

April 29, 2022 Nok Nok News Industry News 0 comments

One of the more recent trends in computing for work has been the arrival of “the could,” or, more accurately, the storage of data and applications online. Rather than have data or software stored and accessed directly on the local storage of a physical device, such as a computer or smartphone, the data or software is instead stored online. A device merely goes to the appropriate platform on the Internet to access the data or functionality. This became crucial in the last two years as the pandemic made working from home and other forms of hybrid work essential for health and safety reasons. However, it also meant that digital crime is now turning its attention to this new frontier which means the need for more cyber security.

The Workload Cyber Security Risk

One of the biggest challenges in cyber security is that identity theft can result in a single individual’s resources being compromised. In other words, if someone’s credit card is stolen, that person’s credit purchases are now controlled by external actors.

However, cyber security for cloud-based computing is even more problematic. A cloud-based work solution allows a person—or criminal—access to their work from anywhere in the world, rather than on a single local machine and hard disk. Now, depending on the workload of that individual and the extent of their administrative privileges, the amount of authority and access of a cyber attack can be devastating. If a single executive has a workload that comprises all the subordinates’ data below, that is access to huge amounts of data. If this is spread across different cloud services such as Microsoft’s Azure, or Amazon Web Services, the risk becomes greater.

Taking Steps

Companies must now consider workload management and protection as well as identity protection. Without protecting a single user’s workload, broader access to other systems and data creates significant cyber security risks.

Companies need to consider better safeguards, such as integrating multifactor authentication systems or biometrics to decrease vulnerability from a single-password security system. For example, the use of digital keys eliminates the danger of secure information needing to be transmitted online at all. However, companies must also carefully assess how their workloads occur, who manages them, and how vulnerable those workloads are to intrusion for a truly secure system.

Cloud-based storage and computing are incredibly efficient and convenient, but they must also be properly protected. To ensure better security for your cloud-based work practices, learn more about Nok Nok’s multifactor authentication technology and passwordless security measures.

Read more
13 Apr
3 Min read

Understanding Zero Trust

April 13, 2022 Nok Nok News Industry News 0 comments

The US government has recently announced that it will be implementing an expansive and comprehensive initiative to integrate a “zero trust” strategy into all agencies. But what exactly does this mean? It’s a goal to introduce better, more secure multifactor and cryptography-based authentication into existing government agencies, which means more security identity checks but fewer obstacles.

Nothing Is Taken For Granted

As the name implies, the “zero trust” strategy works under the assumption that no one should be taken at face value without verification. In this case, however, verification may occur multiple times through different mechanisms and security features, which is a foundation concept of multifactor authentication combined with cryptographic key pairs.

In a traditional “trusted” security system, one verification is enough. The conventional single-password system is a good example of this. A manager, for example, may have complete access to employee records, employee data like bank account numbers and social security numbers, and even credit numbers and mailing addresses of customers via purchasing database. Complete access and control to all this data are granted through inputting the correct password, which could be as complex as a random string of alphanumeric characters or as simple as the manager using the word “password.” Should that single password ever be stolen or guessed by a criminal, all that access and control, the manager has is now transferred to someone else. In some cases, a password isn’t even required. As long as a person logs into a manager’s desktop computer in the office, complete system, network and data access is granted.

The zero trust strategy makes none of these assumptions, and cryptographic multifactor authentication is a cornerstone of this philosophy. Depending on how extensive the zero trust implementation is, it’s not enough to verify a person’s identity logging in. Even the type of connection and device used for the log-in may also need to be confirmed. The person’s identity is then continually checked for high-value events like accessing sensitive data or conducting a payment transaction.

This is especially important in an age where cloud storage and cloud computing-based applications make it possible for a legitimate user to access software and data anywhere. Multi-factor authentication allows someone accessing confidential data from within their own office at corporate headquarters to quickly do the same thing in Japan from their company-issued smartphone. The key difference is that now, even if someone’s password or smartphone is stolen, the cryptographic-based multifactor authentication philosophy of zero trust now has safeguards to prevent one, two, or even three pieces of stolen verification from being enough.

Multiple verification systems can be fast and easy without being cumbersome through biometrics, digital keys, and other design innovations. Learn more here about how Nok Nok’s modern identity and passwordless authentication technology protects today’s multifactor security measures.

Read more
11 Apr
3 Min read

FIDO Standards Eliminate Passwords By Using Key Pairs

April 11, 2022 Nok Nok News Industry News 0 comments

One of the biggest liabilities of relying on a single-password system is granting unprecedented control and access to anyone who knows that password. Unfortunately, the only way to reduce the chance of a password being stolen is to make passwords easier to remember, thus making them easier to guess or figure out through criminals’ increasingly more sophisticated and automated methods.

Conversely, making passwords harder to guess through a string of random alphanumeric characters makes them slow, difficult, and inconvenient to use, eliminating their efficiency while at the same time still retaining the risk of relying upon a single password alone to grant access.

FIDO Improves Security With Passwordless Authentication

An alliance of global companies has now joined to form an organization known as The FIDO Alliance, which stands for “fast online identity.” The FIDO protocol creates a compatible cryptographic standard across devices and software platforms to ensure these cryptographic measures are interoperable across browsers, platforms and devices. The goal of FIDO is to enable phishing-resistant passwordless authentication systems while also making user experiences frictionless and seamless.  These modern security technologies make user access faster, easier, more efficient, and more secure than legacy systems based on the collection, storing an input of personal secrets and information like user’s name and password.

FIDO is doing this through a dual-key based authentication system known as key pairs that use asymmetric encryption methods and offers 2-factor authentication in one encrypted user step.

More Than One Mechanism

Symmetric encryption is something most people are familiar with. Something is encrypted or “locked” using a single device, such as a USB key with data on it. Data is encrypted, inaccessible, and unreadable if the key is present. When that same key is present, the data can be accessed and is decrypted so it can be read.

Asymmetric encryption relies on two keys. One is a “public key” that allows users to choose the form of encryption for the data to be protected. The second is the “private key” that must be present for the decryption to take place. 

In other words, even if the public key is duplicated or stolen, it only grants access to the data. The data still can’t be read because it requires the presence of both the right public key and its pair, the private key, to access the data or access software services. The combination of a FIDO key pair system creates an easy passwordless authentication system that eliminates the inconvenience of creating a strong, hard to remember string of random alphanumeric characters and also does away with the knowledge-based authentication system, such as asking people what their mother’s maiden name was for a hint, which could often be gleaned through searching public social media profiles and posts.

If you’re interested in using the FIDO protocol and moving to a passwordless identity and authentication system, read here to learn more.

Read more
08 Apr
3 Min read

The US Government Adopts The Zero Trust Security Policy

April 8, 2022 Nok Nok News Industry News 0 comments

As the 21st century processes its first major military engagement with the Ukrainian defense against Russian invasion, it has also revealed that digital warfare plays an important role. Unfortunately, cyber security warfare does not restrict itself to only military targets. This is something that both Ukraine and allies worldwide—including the United States—are now discovering for themselves.

As a result, the Whitehouse has now declared that it will be moving forward aggressively to implement a “zero trust strategy” in the computer networks of all relevant agencies and organizations.

Never Trust and Always Verify For Cyber Security

Ironically, the zero-trust strategy has its roots in the Russian proverb, “trust, but verify.” The implication is that even if you have a person or thing that you trust, you should always take the time to verify that who you are dealing with is who you are expecting.

In terms of cyber security, a zero-trust strategy means that even if a person, account, or piece of hardware previously accepted by a network’s infrastructure is legitimate, there should still be verification of the  authenticity of the user. This is a security protocol that is even more important in today’s wireless world, where a legitimate user can potentially log in from any device anywhere in the world. It’s one thing to have a recognized user come into a secure building with staff that identifies them, and go into their own office and use their computer inside a secure network. It’s a different matter when that same person claims to be logging into a secure database using a smartphone in an entirely different country without any user identity checks along the way.

A Comprehensive But Worthwhile Effort

The initiative to bring multiple government agencies into a modern, zero-trust compliant security framework will not be fast, cheap, or easy. Each agency already has its own established conventions and protocols, so there will have to be a lot of adaptation and evolution to respect the needs of the different organizations.

However, the American government’s willingness to commit to Zero-Trust architectures speaks volumes of the nature of cyber security in the 21st century. With the continued reliance on easy access anywhere in the world, cloud-based storage and applications, multi-factor authentication, and other elements of the zero-trust strategy have become essential. A single password, once stolen, can surrender vast amounts of data and system control. Multi-factor authentication, cryptographic keypairs and the zero trust strategy ensure that there are extra safeguards.

Modern identity and cryptographic multi-factor authentication is one way to improve your cyber security. Learn more here about Nok Nok’s modern identity and passwordless authentication technology and how it protects multifactor security measures for more peace of mind.

Read more
06 Apr
3 Min read

Consumer Payment Fraud Is A Growing Threat

April 6, 2022 Nok Nok News Industry News 0 comments

There is both an enormous amount of convenience and speed in using digital payment systems. For the general public, online payments through credit cards or even cryptocurrency enable customers to buy products worldwide that they might otherwise not have local access to. For businesses, online payments negate any possibility of fraudulent payment through counterfeit cash. Every transaction is a legitimate one that uses real funds.

However, just because the actual transactions are legal and legitimate doesn’t mean the person making the purchase is. This is where payment fraud through online transactions is on the rise due to breaches in cyber security.

Identity Theft and Account Takeovers Lead To Payment Fraud

The way payment fraud occurs today has shifted away from traditional strategies like printing counterfeit money and using that false cash to make purchases. Today’s digital criminals look for vulnerable accounts, seize control of them, and then use the funds or payment system associated with those accounts to make purchases. In other words, the money is real, and the account is legitimate, but the person using the account has stolen that access from the rightful owner or is using the account without the owner knowing it.

This results in the victims eventually receiving receipts and other proofs of payment for purchases they never made. It is the cyber security equivalent of someone having their wallet stolen and then the thief using that cash to make purchases.

Rising Fraud

Payment fraud is on the rise in a few key areas, most notably:

  • Digital Wallets
  • Payment Service Provider Transactions
  • Cryptocurrency Transactions
  • Buy Now, Pay Later Transactions
  • Loyalty Reward Points

Billions of dollars in payment fraud occur every year, and one of the reasons for this is the inadequacy of legacy security systems. A single password-only security system, even with multi-factor authentication enabled, is incredibly vulnerable, especially if a careless customer uses an easily deciphered password. Even when a strong, single password is used, criminals use of “keylogging” can defeat this.

Multi-factor authentication is one addition way to “harden” a system against this type of identity theft. These cyber security measures use additional cyber security components, such as physical-digital “keys” or biometric authentication to add stronger layers of security. Even if a password is stolen, the password alone won’t grant access or control of an account without the additional authentication factors.

The challenge, however, lies in ensuring that cyber security measures provide protection without obstruction. If a security feature makes it too difficult to make a purchase, it does more harm than good. This is where initiatives like Nok Nok’s use of FIDO protocols play an important role. Read here to learn more. 

Read more
04 Apr
3 Min read

The Ukraine War Has A Digital Battleground That Affects US Businesses

April 4, 2022 Nok Nok News Industry News 0 comments

Despite the careful language of special military operations being used, the undeniable fact is massive military forces have been directed to invade—and in some cases destroy—vast tracts of Ukrainian land. There is now a war raging between the beleaguered nation of Ukraine and the Russian aggressor, but as a key supporter of the Ukrainian defense, America and its businesses are at risk of attacks on their cyber security.

A Battle With Precedent

Ukrainian digital infrastructure has already shown the effects of cyber-attacks. There have been breaches in everything from their electrical infrastructure to transportation-related networks. Over the years, Russia has tested the boundaries of breaking American cyber security, and the US has in turn responded.

However, with open warfare between one country and another, the world is now seeing how the digital space has become a second battlefield, often with secondary but important consequences. And while the United States is not directly participating in the war, its role as a major supporter of Ukraine has put the American digital space in the target sights of Putin’s “gangster diplomacy.”

What To Expect

Four sectors are traditionally the most likely targets for attacks on cyber security. Finance is a surprise to no one, as Russia is now the victim of history-making sanctions. The energy sector is another, as incursions seek to either seize control or lock legitimate users out of power generation. Transportation and aviation are other sectors, as logistics always plays a crucial role in any successful plan or operation.

However, it is crucial to note that Russian cyber-attacks are not just attacks of a deliberate strategy; they are also attacks of opportunity. Russian attacks are not necessarily conducted by individuals targeting only specific, named targets. They actively hunt for vulnerabilities anywhere and will exploit them if found.

This is where reliance on a single-password-only and knowledge-based cyber security system can expose serious vulnerabilities for any business. Multi-factor authentication systems, or even passwordless authentication systems that use other measures like cryptographic biometrics, increase the trust and safety of systems by orders of magnitude. Passwordless systems have no password to be stolen, and for multi-factor authentication systems, a password being compromised no longer means systems and access and control are given. Without those additional factors, such as a one-time randomly generated code, or the detection of a physical-digital key, a system remains inaccessible.

If you’re interested in transformational change to your cyber security, learn more about Nok Nok’s modern identity and passwordless authentication technology, and cryptographic multi-factor security measures for better protection and greater peace of mind.

Read more
01 Apr
3 Min read

Cryptocurrency Is Growing In Both Popularity & Theft

April 1, 2022 Nok Nok News Industry News 0 comments

In recent years, one of the most popular growing trends in finance and technology is the use of “cryptocurrency.” This is a form of digital money with no physical or historical legacy basis in the way that fiat currencies like the dollar possess. Cryptocurrency exists as computer code shared across the Internet, meaning that its value is constantly confirmed and re-confirmed by the entire Internet, making it both easy to transfer and impossible to counterfeit. It is also deregulated and not under the control of any nation or bank, making it an asset that no government can control.

However, this rising popularity has also put it under more scrutiny. The US government is now laying the groundwork to regulate cryptocurrency, and part of the issue is the growing concerns about the cyber security around crypto. It is now experiencing a high rate of theft.

Account Theft

While cryptocurrency can’t be counterfeited the way dollar bills can, it can be stolen more easily than a fiat currency in some respects. One of the popular misconceptions of cryptocurrency is that transactions are extremely difficult to trace, and therefore it has become popular for illegal transactions. However, the fact that crypto-transactions are immutably stored on blockchain makes cybercriminals and theft easier to trace.

However, there is a serious cyber security issue with cryptocurrency, and that is the actual seizing and controlling of an account can be very easy. Depending on the safeguards a cryptocurrency owner takes or doesn’t because they are based on traditional web technologies, crypto accounts can be stolen and the funds transferred elsewhere. In addition, today’s crypto accounts are also vulnerable because a single crypto key is used for both a user’s identity and their account e-wallet address 

Passwords Are Not Enough

One of the ways that cryptocurrency may be extremely vulnerable is if owners leave the security of their currency up to a single password. A single password, once figured out or stolen through methods such as phishing, means the account’s control can be seized, the legitimate user locked out of their own funds, and their cryptocurrency transferred to another account with only painful and costly forensics required to trace and recover it. Cryptocurrency’s greatest selling point – that it is anonymous and unregulated – is also its greatest weakness.

The best way to protect cryptocurrency is to take extra precautions. Multi-factor authentication is one way to make account takeovers more difficult since the addition of other authentication factors renders the theft of a password harder. Switching over to other cyber security measures, such as passwordless authentication systems like modern FIDO biometric authentication, is another way to ensure that typical phishing and identity theft methods fail to penetrate a system. 

As the world relies increasingly on digital storage and access, cyber security measures need to keep up. For the best digital protection and peace of mind,  learn more here about Nok Nok’s modern identity and passwordless authentication and how it protects multifactor security measures.

Read more

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

info@noknok.com

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • World Password Day: Time to Ditch Passwords for Good?
  • Verizon 2025 DBIR: Credential Attacks Still Dominate – A Nok Nok Perspective
  • Phillip Dunkelberger Recognized as a “Champion in Security” by Portal26 at RSA Conference 2025
  • Another Step Towards a Passwordless Future

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

 

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • info@noknok.com

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required

[mc4wp_form id=”18773″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18790″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18789″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18788″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18787″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18786″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18785″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18784″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18783″]

MUFG-800×600

“Transactions using mobile devices are rapidly spreading and it is essential to support both usability and security. By combining Hitachi’s abundant system development capabilities and know-how in the financial system and security related fields, and Nok Nok’s globally deployed and proven FIDO certified products, we achieved this compatibility, which led to this adoption.”

– Mr. Nobuo Nagaarashi, General Manager, Financial Information Systems 1st Division, Hitachi, Ltd.

 

The M in MUFG stands for Mitsubishi, which is a combination of the words mitsu and hishi. Mitsu means three. Hishi means water chestnut, and the word denotes a rhombus or diamond shape.  In partnership with Hitachi, MUFG has enabled passwordless authentication solutions across many of the bank’s apps and services.

Coverage In The Paypers
Coverage In Finextra
intuit

“As an early adopter of FIDO, we’ve seen significant business benefits and are completely on board with continuing to leverage the latest FIDO innovations with our partner, Nok Nok.”

– Rakan Khalid, Group Product Manager, Identity.

 

Intuit has delivered passwordless authentication across mobile applications and devices using Nok Nok’s S3 Suite. The results have reduced customer friction in their Intuit application experience.

Read The Nok Nok Intuit Case Study
Watch the FIDO Alliance Webinar: The Right Mix
Watch Marcio Mello discuss Intuit’s Nok Nok implementation at Identiverse 2019:
docomo-800×600

“DOCOMO is a worldwide innovator in providing its millions of customers with simple and strong authentication backed by a standards-based approach.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

As one of Nok Nok’s earliest customers, NTT DOCOMO became the first carrier to offer a billing system that is enabled by FIDO, the first to offer a federated Identity system integrated FIDO, and was the first to offer a mobile device that authenticates via the iris biometric modality.

Coverage In Find Biometrics
Coverage In Telecompaper
bbva-800×600-2

“Traditionally, one of the biggest challenges of authentication systems has been to balance security with user experience. Due to the FIDO standard, we are confident that both elements work together seamlessly to provide customers with the highest security standards, along with a transparent and agile user experience.”

– Juan Francisco Losa, Global Technology & Information Security Officer.

Nok Nok partnered with banking leader, BBVA to improve the security and user experience of the bank’s mobile banking services through state-of-the-art biometric capabilities.

Coverage In American Banker
Coverage In Planet Biometrics
Softbank-800×600-1

“We can no longer rely on passwords for our financial or other sensitive transactions as they are weak, forgotten and easily hacked. We are very pleased with SoftBank’s decision to choose our standards-based authentication platform for their millions of customers.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

Millions of SoftBank’s mobile subscribers now have the ability to use biometrics for authentication through the mobile application “My SoftBank Plus”. With this implementation, SoftBank’s mobile users access data with the My SoftBank service using biometrics for a frictionless, simple and fast authentication experience.

Coverage In Mobile ID World
Coverage In Planet Biometrics
Coverage In The Paypers
Aflac-Japan-800×600-1

“Aflac is the first Japanese insurance provider to deploy a FIDO-certified solution, and we would like to continue collaborating with Nok Nok Labs to introduce it to banks, insurance industry and other industries.”

– Michihiko Ejiri, VP, Head of Portal Service Division, Service Technology Unit, Fujitsu Limited.

With the Nok Nok S3 Suite, Fujitsu has provided Aflac customers with strong authentication to their mobile claims payment application using any biometrics on their iOS and Android devices. The solution also provides Aflac and their customers with a scalable method to authenticate users that is interoperable with their existing security environments and reduces or eliminates the reliance on usernames and passwords.

Coverage In Find Biometrics
Coverage In Find Authority
lichtenstein-800×600-1

“For our customers, we only use the most secure products on the market that meet their requirements. Nok Nok perfectly aligns within our product portfolio and we are proud of the very trusted partnership.”

– Lukas Praml, CEO of YOUNIQX.

 

YOUNIQX Identity AG, the award-winning subsidiary of the Austrian State Printing House (OeSD) and Nok Nok partnered to deliver a electronic identity system (eID) for the citizens of the country of Liechtenstein.  This deployment represents the first time that Nok Nok’s FIDO platform has been used to deliver an eID.

FUN FACT
As of 2009 Liechtenstein’s per capita income was $139,100, the highest of any country in the world.

Learn How FIDO Supports EIDAS Regulation
Coverage In Mobile ID World
Coverage In The Paypers
Coverage In Biometric Update
Gallagher-800×600-1

“Nok Nok’s state-of-the-art, standards-based platform will deliver a tremendous user experience,”

– Steve Bell, Chief Technology Officer at Gallagher

When a horse called Joe took too much of a liking to using a car as a scratching post, owner Bill Gallagher Sr. devised a cunning electrical circuit that delivered a shock whenever the horse rocked the vehicle, and in doing so created a company.  Today, with passwordless authentication from Nok Nok, Gallagher is leading the IoT industry with innovative solutions that work in your office and in the outback.

Coverage In Biometric Update
Coverage In Mobile ID World
Coverage In Planet Biometrics
tmobile-800×600-1

“Our Forgot Password flows were running at about 65%. After we rolled out FIDO by Nok Nok, our forgot passwords dropped to 7%.”

Michael Engan, T-Mobile

 

Using the Nok Nok S3 Suite, T-Mobile has become a leader in carrier adoption of passwordless authentication. Their solutions have reduced forgotten passwords and dramatically improved customer satisfaction.

Watch Michael Engan from T-Mobile talk about their implementation of Nok Nok’s S3 Authentication Suite at Identiverse 2019.

  • 日本語