Compromised credentials represent a significant percentage of security breaches. The next stage of zero trust is to switch to passwordless authentication, which is harder to crack than traditional passwords. Like zero trust systems, the technology comes with benefits and challenges. This case study will focus on best practice approaches to implementing passwordless authentication, its advantages, the hurdles to be aware of and whether it could be right for your organisation.