• Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Nok Nok
Nok Nok News

Nok Nok News

29 Nov
1 Min read

Nok Nok and UberEther Partner to Deliver Phishing-Resistant MFA Fedramp-Certified IAM Solutions to Protect the US Federal Government and its Suppliers

November 29, 2022 Nok Nok News Press Release 0 comments

Nok Nok’s S3 Suite brings Next Level MFA to UberEther’s IAM Advantage Platform. Read the full press release.

Read more
29 Nov
3 Min read

Former Hacker Has 3 Tips For Better Cybersecurity

November 29, 2022 Nok Nok News Industry News 0 comments

Kevin Mitnick was a hacker that was eventually charged and prosecuted for wire fraud crimes. However, he left that life behind and began a career as a cybersecurity consultant for clients as prestigious as the US government and as well-known as Microsoft. He used those years of experience as a criminal to show others how to defend themselves against digital intrusions. According to CNBC, he has three important strategies for anyone interested in better cybersecurity.

Disciplined Password Management For CyberSecurity

For anyone that is still relying on passwords, while it may be inconvenient, the best way to increase security while still using these systems is to use “strong passwords.” Strong passwords are random strings of alphanumeric characters, making them impossible to guess.

The best way to handle multiple strong passwords is to use a password management system. Relying on an easy-to-remember or guess password or using the same strong password repeatedly leaves the user vulnerable to password theft.

Upgrade To NextLevel Multi-Factor Authentication

For those who want to take things a step further, switching to multi-factor authentication systems adds extra security layers. Traditional passwords have only one point of access. Producing the correct password grants total access. Multi-factor, as the name implies, adds additional layers of verification.

Multi-factor authentication can use additional variables, such as requiring an extra code inputted that is sent via text over a phone. Or it can eliminate passwords and codes, relying on biometrics such as voice, face, or fingerprint recognition and encrypted passkeys tied to a specific device such as a phone or laptop.

Isolated Devices

For the ultimate in security, a final tip, specifically relating to financial or other confidential data, is investing in specific devices used only for that purpose. This means buying a phone, tablet, laptop, or desktop computer and using only that device to access financial data, store confidential data, or even exclusively log into financial or confidential accounts on these devices.

While this is a more drastic method, having dedicated devices for protected data increases security by 98%. If these devices are never used for everyday computing activity and only ever activated and utilized for important data-related interactions, the odds of theft are dramatically lower. However, this does require more time and investment.

For most people, the more practical system is upgrading cybersecurity to a multi-factor authentication system, such as the standardized protocols used and offered by the FIDO alliance. If you’re interested in using the FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Read more
22 Nov
3 Min read

Nok Nok Now Provides Full Passkey Support

November 22, 2022 Nok Nok News Press Release 0 comments

Nok Nok, one of the founding partners in the FIDO Alliance, or “Fast IDentity Online,” is now announcing full support for passkeys to offer digital service providers an alternative to traditional password verification with safer, faster, passwordless authentication combined with passkeys.

Over 80% of successful digital intrusions result from password credential theft, either through sophisticated phishing techniques to steal passwords or personal secrets or user negligence in failing to use strong, secure passwords that are difficult to remember. With digital cyber crime accelerating, single password verification systems are becoming increasingly vulnerable as all it takes is one stolen password to assume significant or complete control of a customer’s system.

Passkeys As A Solution

Passkeys are a phishing-resistant replacement for passwords that provide faster, easier, and more secure sign-ins to websites and apps across a user’s devices. Unlike passwords, passkeys are resistant to phishing, are always strong, and are designed so that there are no shared secrets.  Different user authenticators can be used, such as various biometric factors like face or fingerprint identification, but this is also combined with additional authentication procedures, such as verifying encrypted keys on a personal device, such as a phone, for additional security.

For clients who already support FIDO, the technology behind passkeys, the Nok Nok S3 authentication platform now fully. supports single-device and multi-device passkeys and requires no code changes. For clients who do no already support FIDO, the Nok Nok S3 suite provides passkey support for both single-device and multi-device passkeys on one authentication infrastructure. Integrating passkeys not only makes user registration and sign-in more secure but also makes them faster and less prone to error and frustration.

Improving User Experiences

Because of the ease of passwordless authentication based on passkeys, businesses have found that passkey sign-in dramatically reduces user friction during sign-in while also reducing credential theft from phishing attacks since there are no shared secrets with passkeys. Passkeys are the next-level multi-factor authentication designed to replace passwords. Even though a typical “strong password” is possible with a long string of random alphanumeric characters, these passwords are harder to remember and they still require a second authentication factor such as SMS or email of passcodes.  Passkeys do away with passwords and the need for a second code for authentication (two factor authentication). because the technology behind passkeys provides multi-factor authentication in one simple, user step.

Passwordless authentication with passkeys offer a 99.5% sign-in success rate and typically speeds up the sign-in process for users by anywhere from 100-200%. This means fewer sign-in failures, less frustration, and perhaps most importantly, people not abandoning a service because they find the traditional multifactor authentication process too restrictive, demanding, and inconvenient. Thus, they switch to another service that treats them better.

These initiatives by the FIDO alliance continue to provide more security to businesses and their data, with more convenience and speed for customers. Do you need to learn more about FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Read more
01 Nov
3 Min read

Banks Are Looking More Closely Into Passkey Security Systems

November 1, 2022 Nok Nok News Industry News 0 comments

Since the dawn of business, banking has been one of the services that have required the most security. Whether preventing physical cash from being robbed or ensuring that cheques are legitimate, banking relies on trust and security to facilitate financial transactions.

Now, in a digital age, where identity theft is an ongoing concern, the traditional password system is losing its luster, and more banks are turning to more advanced security systems like passkeys.

What Is A Passkey?

A traditional password is a single security point. If a user knows the required password and inputs it correctly, access is granted to a device or account. A passkey is a multifactor authentication system that uses more than one means of verification. Passkeys are password free, usually requiring a device such as a smartphone or a laptop to act as a primary interface and Bluetooth proxy when needed. This means that a user will first access their phone using different means, such as facial recognition, a fingerprint, voice recognition, PIN, or even a swipe pattern to validate their device. 

Once this is done, the device then uses additional verification through a Bluetooth connection that sends a unique “public key” to the account associated with that device and matches it with a “private key.” This portion of the verification is done automatically, with no additional actions required from the user. Once the keys have confirmed validity, the user may now access the account from that device. If the user needs to use another device, the QR code is required to transfer verification processes to that new device instead of using the primary one.

More Safety

The convenience and security of a passkey system is an effective alternative to traditional password systems. Groups like the Fast Identity Online or FIDO alliance have worked closely with major technology companies such as Apple and Google to integrate the standards and protocols for passkey systems and make multifactor authentication an easier and more secure means of securing data. 

The use of more than one verification system, combined with password-free authentication systems like biometrics, means users no longer have to memorize long, difficult strings of random alphanumeric characters. Storing the biometric data on a device such as a phone or a laptop also ensures that the data itself remains private and the credentials can’t be stolen online. If you’re interested in passkey systems for agile, increased security integrating a more convenient password-free verification system using FIDO standards, read here to learn more.

Read more
25 Oct
3 Min read

More Banks & Credit Cards Are Using Biometrics

October 25, 2022 Nok Nok News passwordless authentication 0 comments

Thanks to the efforts of the FIDO alliance and big businesses such as Google and Apple, passwordless authentication is growing in the world of banking and credit card transactions. Biometric features are increasingly found to be fast, safe, efficient, and more secure for users, though some factors are still being addressed.

Global Adoption

Ironically, despite the United States’ reputation for developing cutting-edge technology, the American public often is slower to adopt new technologies and techniques compared to the rest of the world. For example, Alipay was one of the earliest vendors to introduce facial biometric payment in China. As a result of this early implementation, payment using facial biometrics is ahead of the curve in China compared to the United States. However, part of the reason for the slower uptake in the United States is cultural factors. Whereas Chinese shoppers don’t worry too much about whether facial biometrics are an invasion of privacy, American shoppers do and thus express reluctance. Conversely, American shoppers seem more comfortable with a fingerprint biometric than many other countries.

Another issue is trust and regulation. Europe is generally regarded as a harsher, more regulated, and thus “safer” transactional environment. So the thinking is that if biometric transactions meet the stringent demands of European Union financial regulations, that will mean they more easily exceed the safety and privacy requirements that would be in place in the United States.

Devices Matter

One of the most promising approaches for banking and credit card transactions has been using mobile devices for verification and authentication. There are multiple reasons this solution is popular, not the least of which is the ubiquity of such personal mobile devices in most of the population. However, the other advantage of this is that biometric authentication can remain private.

In this solution, biometrics and the data required for authentication remain on the phone and not in some online database where a breach would result in the theft of private information. Instead, once someone’s biometrics have been confirmed, the mobile device itself is considered authenticated. It can communicate with other networks, using a multifactor authentication system, of which biometrics is merely one link in the chain but the easiest one for people to use, while other factors handle the “heavy lifting” in the background. All of this is part of the initiatives employed by the FIDO alliance to make things easier. If you’re interested in using the FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Read more
18 Oct
3 Min read

Telephone Companies Find Value In The Zero Trust Security Concept

October 18, 2022 Nok Nok News Industry News 0 comments

The United States relies increasingly on mobile devices like smartphones to send and receive data, and this meant that a need for wireless data transmission similar in volume to wired Internet connections has come into greater demand. The result is that the 5G wireless network, the latest, fastest, and largest data transmission standard, continues. The largest telecommunications companies, such as Verizon and AT&T, continue their rollout, with an estimated coverage of 175 and 100 customers. However, this also means that more security will also be required as more data is transmitted across 5G networks. And zero trust policies, with convenient password-free authentication systems, will be critical to this success.

What Is Zero Trust?

As the name implies, “zero trust” security means making no assumptions about the validity of a person or device attempting to access data and requiring multiple stages of verification and authentication throughout every step of login and transaction. This has become even more prevalent in recent years as the pandemic forced many companies to keep workers at home, using home devices, and in some cases, even their own smart devices, to remotely access data. This meant that some of the usual trust mechanics, such as knowing a valid user was correctly accessing the network because they could be physically seen at their desk, on their office computer, accessing data locally stored on that device, could no longer be taken as givens. Now, workers needed to be able to access data remotely from any number of locations and devices, making authentication of legitimate users a priority.

One of the hallmarks of zero trust protocol is constant verification. It is not enough to accept a password of biometric authentication once and then turn a blind eye to whatever that user does for the remainder of the transaction period. Verification is an ongoing process for different actions; thus, password-free authentication systems are important in streamlining this process.

Another important aspect of the zero trust approach is “limiting the blast radius.” A security protocol is extremely vulnerable if it assumes no breach will ever happen and thus has no contingencies in place if one occurs. Zero trust protocols take breaches of some kind as a given and compartmentalize access and activities so that even if a breach occurs, it can be quickly contained and quarantined, rather than allowing a single breach to gain complete, centralized control of an entire system.

If you are interested in zero trust security concepts and incorporating FIDO protocol into a password-free authentication system, read here to learn more.

Read more
11 Oct
3 Min read

Transitioning To Passwordless Authentication Easier Than Ever

October 11, 2022 Nok Nok News Industry News 0 comments

While passwords and knowledge-based access (KBA) were once the herald of cybersecurity, the evolution of technology and the proliferation of digital connectivity are slowly making passwords a thing of the past. Passwords have become a nuisance for both users, employees and IT personnel, causing frustration as users struggle to remember passwords that they need to update regularly, while costing organizations millions of dollars in OPEX and lost productivity and revenue during password recovery and resets – both behind and outside the enterprise perimeter. Passwordless authentication can help avoid this.

4 Tips For A Frictionless Transition To Passwordless Authentication

NokNok Inc has been a pioneer of passwordless authentication, encouraging organizations and enterprises to shift to improve their cybersecurity. Plenty of enterprises have started to invest in passwordless authentication but this transition can be challenging. The following tips can help for a smoother enterprise transition for everyone involved.

Manage Passwords As Best As You Can

Don’t rush the transition. If your organization must use passwords for the next few years, simply do your best to keep passwords safe. Password managers continue to be funded and enterprise versions can help prevent password loss while keeping passwords safe. Password managers offerempowering features that help employees create unique and complex passwords without the fear of forgetting them . Many offer extensive support for both web and mobile app authentication as well – including web browsers.

Multifactor Authentication Is Important

Multifactor authentication (MFA) is a great way to ease employees into passwordless technology. MFA is the next natural step for enterprises who cannot entirely shift users and employees to passwordless yet. Most passwordless platforms can be integrated into existing security infrastructure and can offer MFA combined with modern biometric authentication since most devices already offer native biometric features.

Use True SSO To Centralize Authentication

True SSO is another step that can ease the transition to passwordless authentication while improving security. True single sign-on (SSO), offered in the cloud, allows users to log on to devices and platforms using only a single set of access credentials. Modern passwordless systems also provide wide support for SSO infrastructure.

Be Realistic With Passwordless Authentication

While passwordless is definitely the future and now here to stay, it will likely take many more years before the world’s digital services become fully passwordless. Don’t expect your entire organization or your customer base to go fully passwordless in a matter of years because many are still not comfortable with biometric-based authentication. Be realistic about the changes that you can make because it is fully possible to improve security with a move toward passwordless authentication without burdening IT departments with sudden changes to their security infrastructure.  Most enterprise infrastructures and the complex ecosystems with which they are connected, are still entirely based on password and KBA. Digital transformation projects can last years to finish migration.

Nok Nok Inc offers a range of passwordless authentication, payments and transaction verification feature that meet your organization’s B2C passwordless needs where you are. We support for and integration with existing multifactor authentication for customers who are not yet ready to entirely adopt biometric-based passwordless authentication. Organizations who have shifted to our services saw 50% reduction in customer onboarding time and a staggering 78% increase in sign in customer sign-inspeed. Harness the phishing-resistant customer security offered by NokNok’s passwordless technologies. Learn more about Nok Nok Inc’s products here.

Read more
04 Oct
3 Min read

Blockchain Vulnerabilities Have Cost More Than A Billion

October 4, 2022 Nok Nok News Industry News 0 comments

2022 has been a tough year for crypto investors as blockchain platforms have been targeted by cyber attackers left and right. A total of $1.4 billion has been lost due to these attacks. Ronin, a bridge that supports Axie Infinity, has lost $615 million; Wormhole, a bridge backed by Jump Trading, lost $320 million; Horizon, a bridge by Harmony, lost $100 million; and around $200 million was stolen from Nomad.

How Were Blockchain Networks Hacked?

Cyberattackers exploit vulnerabilities in blockchain technology, specifically blockchain bridges and humans. Blockchain bridges are a type of software through which people send out tokens from one blockchain network to another. Bridges, being the piece of code that enables smart contracts to execute without human intervention, typically hold large values being transferred from one network to another. Without adequate security, these bridges are easy targets.

Although transactions must first be approved by validators to become successful, hackers are able to manipulate validators into handing over their private keys or compromise only a few accounts to withdraw funds. Bridges are central to blockchain technology, which is why their increased vulnerability is a major cause for concern.

Another way hackers steal funds is through human vulnerability. Some rely on social engineering tricks to convince a victim to send funds to them. Another method is by simply stealing cryptographic keys or private digital signatures, the access for which they gain  through apps, wallets, and other third-party vendors that authenticate users to their digital services via legacy authentication. In other words, password-based authentication.

Eliminating The Human Risk Factor With Passwordless Authentication

Cryptocurrencies are continuously expanding, and blockchain technology grows with it. Despite the advanced technology with which blockchain technologies operate, cybercriminals are still able to find ways in through something as basic as a password login.

Passwords have long been a favorite vulnerability of cyber attackers. Both methods used by cyberattackers of blockchain networks succeeded through compromised phishing and man-in-the-middle attacks resulting in stolen passwords. With the increased interconnectedness of systems nowadays, even a technology as sophisticated and secure as decentralized blockchain requires strong, passwordless authentication,  because of its distributed access.

Unphishable, key-based passwordless authentication is one way to elevate the security for blockchain networks across all platforms, especially third party applications. Nok Nok Inc, along with the global industry group (FIDO Alliance) they founded are on a mission to reduce people’s reliance on extremely vulnerable legacy password and knowledge-based system access.

Passwordless authentication is a possession-based and biometric authentication technique that relies on public-private cryptography. It generates a public-private key pair—the public key is shared with a service while the private key remains safe in the user’s device, protected by a PIN or biometrics. This system is incredibly convenient for end-users, as well as safe.

You can strengthen your cybersecurity with Nok Nok’s passwordless authentication system. To learn more about Nok Nok Inc’s industry-leading FIDO platform, contact us here.

Read more
27 Sep
3 Min read

Is Attack Surface Management The Future Of Cyber Security?

September 27, 2022 Nok Nok News Industry News 0 comments

Reports showed that there has been an increase in ransomware events in the past year. Verizon’s 2022 Data Breach Investigations Report saw an increase of 25% in overall attacks in 2021. Cyber security events are more debilitating for organizations today that operate on a highly interconnected capacity, resulting in broader attack surface, making cyber resiliency even more urgent.

The State of Cyber Security Today

In the last few years, organizations underwent a digital transformation that resulted in extremely interconnected apps, clouds, services, workloads, users, and devices operating in multi-cloud and hybrid environments. While this transformation contributed to convenience for end users, it has made organizations and enterprises more vulnerable to cyberattacks.

With the plethora of apps and databases and digital services that a singular enterprise employs today, cyber security leaders must oversee and control a wider breadth of vulnerable surface to avoid attacks. However, it is not just the attack surface that they need to oversee. They must also be aware of the beneath-the-surface relationships between applications. Due to their interconnectedness, a successful cyberattack on one asset could compromise others, if not the whole system. Enterprises must, then, find a way to minimize vulnerabilities such that the rest of the system can operate safely even after an asset has been compromised.

Attack Surface Management

A solution to the increased vulnerability due to wider attack surfaces is attack surface management. This new cyber security strategy involves mapping relationships within the business systems, automating the discovery of security coverage gaps, therefore allowing organizations to mitigate risk. With attack surface management, organizations can implement preventative policies and plans that protect the system as a whole and minimize tendencies to overlook some vulnerabilities.

Here are some steps enterprises can take to start implementing attack surface management:

Evaluate new vendors carefully, ensuring that they have secure third-party integrations and exposed interfaces.

Implement reporting standards. Take full advantage of CISO standards to map out new assets, vulnerabilities, tickets they addressed and attacks foiled, and the attack surfaces associated with critical business functions.

Emphasize the need for transparency in app creation, third-party access, and identity management.

Keeping Up With Ever-changing Tides

Protecting and managing your attack surface is crucial in today’s cyber security climate. Enterprises can protect their increasingly interconnected systems with passwordless authentication. Nok Nok Inc’s passwordless authentication systems integrates well with attack surface management strategies. This system enables users to sign in across platforms and apps securely without the need for passwords, which are so easy to steal. Our passwordless authentication protects entire cyber ecosystems from attacks. These are supplemented by multifactor authentication so that even if a password is compromised, other assets remain safe. Learn more about Nok Nok Inc’s products here.

Read more
20 Sep
3 Min read

Beyond VPNs: Zero-Trust Approach To Security

September 20, 2022 Nok Nok News Industry News 0 comments

Remote work is the present. Over 97% of workers prefer working remotely, and more employers are starting to embrace remote work. However, for cyber security leaders, remote work means more cyber security risks. Traditionally, IT professionals relied on VPNs to safely give employees access to company data and apps. However, VPNs are no longer suitable for the modern hybrid workplace. The key? Password free, zero-trust security.

Why VPNs Are No Longer Enough

Virtual private networks or VPNs were once the height of privacy and security over the Internet. The encrypted connection protects organizations’ networks while allowing employees to exchange information digitally through trusted computers. However, with the rise of remote work and the practice of “bring your own device” or BYOD, VPNs have become an easy target for hackers.

With employees bringing their own devices to work, IT administrators can no longer monitor how safe the devices are. So, when a compromised device or credential gets access to a VPN network, the entire network becomes compromised as well. Sometimes, it takes years for IT administrators to notice that their network has been compromised, meaning that their data (and that of their clients) are leaked continuously for years.

Apart from that, VPNs simply no longer fit the modern workplace set up. Keeping a VPN network has become costly and time-consuming, resulting in poor user experience. It is costly for IT administrators to check and ensure that each device can be trusted. For organizations with remote workers in different geographical areas, they will need to establish additional VPN servers in these employees’ locations.

A Modern Solution: Zero-Trust Approach

A zero-trust security model removes trust on all devices, and requires all users inside or outside the network to be authenticated, authorized, and validated before being granted any access to the organization’s data. This minimizes instances of misuse and compromised credentials.

This type of security framework turns a decentralized IT network into an advantage. By requiring continuous vetting for every attempt to access the network, zero-trust is able to limit the access of a hacker, and, therefore, the impact of a data breach. IT administrators will also be able to detect a breach right away and respond right away.

Password Free Approach To Security

The zero-trust approach is best implemented with password free authentication. KBA-based authentication tends to be burdensome to the users and easy targets to hackers. By replacing passwords with key-based authentication, organizations enjoy 99.5% sign-in success rates, 78% sign-in speed increases, and increased security overall across employee and customer logins.

Check out Nok Nok products to learn more about how password free authentication fits your organization.

Read more
  • 1…45678…11

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • World Password Day: Time to Ditch Passwords for Good?
  • Verizon 2025 DBIR: Credential Attacks Still Dominate – A Nok Nok Perspective
  • Phillip Dunkelberger Recognized as a “Champion in Security” by Portal26 at RSA Conference 2025
  • Another Step Towards a Passwordless Future

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

 

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required

[mc4wp_form id=”18773″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18790″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18789″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18788″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18787″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18786″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18785″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18784″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18783″]

MUFG-800×600

“Transactions using mobile devices are rapidly spreading and it is essential to support both usability and security. By combining Hitachi’s abundant system development capabilities and know-how in the financial system and security related fields, and Nok Nok’s globally deployed and proven FIDO certified products, we achieved this compatibility, which led to this adoption.”

– Mr. Nobuo Nagaarashi, General Manager, Financial Information Systems 1st Division, Hitachi, Ltd.

 

The M in MUFG stands for Mitsubishi, which is a combination of the words mitsu and hishi. Mitsu means three. Hishi means water chestnut, and the word denotes a rhombus or diamond shape.  In partnership with Hitachi, MUFG has enabled passwordless authentication solutions across many of the bank’s apps and services.

Coverage In The Paypers
Coverage In Finextra
intuit

“As an early adopter of FIDO, we’ve seen significant business benefits and are completely on board with continuing to leverage the latest FIDO innovations with our partner, Nok Nok.”

– Rakan Khalid, Group Product Manager, Identity.

 

Intuit has delivered passwordless authentication across mobile applications and devices using Nok Nok’s S3 Suite. The results have reduced customer friction in their Intuit application experience.

Read The Nok Nok Intuit Case Study
Watch the FIDO Alliance Webinar: The Right Mix
Watch Marcio Mello discuss Intuit’s Nok Nok implementation at Identiverse 2019:
docomo-800×600

“DOCOMO is a worldwide innovator in providing its millions of customers with simple and strong authentication backed by a standards-based approach.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

As one of Nok Nok’s earliest customers, NTT DOCOMO became the first carrier to offer a billing system that is enabled by FIDO, the first to offer a federated Identity system integrated FIDO, and was the first to offer a mobile device that authenticates via the iris biometric modality.

Coverage In Find Biometrics
Coverage In Telecompaper
bbva-800×600-2

“Traditionally, one of the biggest challenges of authentication systems has been to balance security with user experience. Due to the FIDO standard, we are confident that both elements work together seamlessly to provide customers with the highest security standards, along with a transparent and agile user experience.”

– Juan Francisco Losa, Global Technology & Information Security Officer.

Nok Nok partnered with banking leader, BBVA to improve the security and user experience of the bank’s mobile banking services through state-of-the-art biometric capabilities.

Coverage In American Banker
Coverage In Planet Biometrics
Softbank-800×600-1

“We can no longer rely on passwords for our financial or other sensitive transactions as they are weak, forgotten and easily hacked. We are very pleased with SoftBank’s decision to choose our standards-based authentication platform for their millions of customers.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

Millions of SoftBank’s mobile subscribers now have the ability to use biometrics for authentication through the mobile application “My SoftBank Plus”. With this implementation, SoftBank’s mobile users access data with the My SoftBank service using biometrics for a frictionless, simple and fast authentication experience.

Coverage In Mobile ID World
Coverage In Planet Biometrics
Coverage In The Paypers
Aflac-Japan-800×600-1

“Aflac is the first Japanese insurance provider to deploy a FIDO-certified solution, and we would like to continue collaborating with Nok Nok Labs to introduce it to banks, insurance industry and other industries.”

– Michihiko Ejiri, VP, Head of Portal Service Division, Service Technology Unit, Fujitsu Limited.

With the Nok Nok S3 Suite, Fujitsu has provided Aflac customers with strong authentication to their mobile claims payment application using any biometrics on their iOS and Android devices. The solution also provides Aflac and their customers with a scalable method to authenticate users that is interoperable with their existing security environments and reduces or eliminates the reliance on usernames and passwords.

Coverage In Find Biometrics
Coverage In Find Authority
lichtenstein-800×600-1

“For our customers, we only use the most secure products on the market that meet their requirements. Nok Nok perfectly aligns within our product portfolio and we are proud of the very trusted partnership.”

– Lukas Praml, CEO of YOUNIQX.

 

YOUNIQX Identity AG, the award-winning subsidiary of the Austrian State Printing House (OeSD) and Nok Nok partnered to deliver a electronic identity system (eID) for the citizens of the country of Liechtenstein.  This deployment represents the first time that Nok Nok’s FIDO platform has been used to deliver an eID.

FUN FACT
As of 2009 Liechtenstein’s per capita income was $139,100, the highest of any country in the world.

Learn How FIDO Supports EIDAS Regulation
Coverage In Mobile ID World
Coverage In The Paypers
Coverage In Biometric Update
Gallagher-800×600-1

“Nok Nok’s state-of-the-art, standards-based platform will deliver a tremendous user experience,”

– Steve Bell, Chief Technology Officer at Gallagher

When a horse called Joe took too much of a liking to using a car as a scratching post, owner Bill Gallagher Sr. devised a cunning electrical circuit that delivered a shock whenever the horse rocked the vehicle, and in doing so created a company.  Today, with passwordless authentication from Nok Nok, Gallagher is leading the IoT industry with innovative solutions that work in your office and in the outback.

Coverage In Biometric Update
Coverage In Mobile ID World
Coverage In Planet Biometrics
tmobile-800×600-1

“Our Forgot Password flows were running at about 65%. After we rolled out FIDO by Nok Nok, our forgot passwords dropped to 7%.”

Michael Engan, T-Mobile

 

Using the Nok Nok S3 Suite, T-Mobile has become a leader in carrier adoption of passwordless authentication. Their solutions have reduced forgotten passwords and dramatically improved customer satisfaction.

Watch Michael Engan from T-Mobile talk about their implementation of Nok Nok’s S3 Authentication Suite at Identiverse 2019.

  • 日本語