Welcome!

News Feed Item

SecureAuth Expands European Operations

Provides Award-Winning 2-Factor Authentication With Single Sign-On Capabilities and Cloud-Based Authentication to Meet Unique Demands of the Region

EGHAM, UNITED KINGDOM -- (Marketwired) -- 03/14/14 -- SecureAuth, a leading provider of 2-Factor Access Control, today announced from the Gartner Identity and Access Management London Summit 2014 that it is expanding its sales operations in Europe, with its award-winning solutions, SecureAuth IdP and SecureAuth 2-Factor as a Service.

SecureAuth IdP was recently awarded the "Best Mobile Identity Solution" at the Global Mobile Awards 2014, announced during Global World Congress in Barcelona, Spain; and was commended by the judges as, "An excellent, successful approach to enterprise user authentication, and a solution to problems that enterprises are desperate to solve."

"Rather than cumbersome and expensive authentication solutions, we offer flexible and more secure options for managing users' identities," comments Craig Lund, Chief Executive Officer at SecureAuth Corporation. "Organizations can use SecureAuth to control identities and access for mobile, cloud, web apps, and VPN resources without hassle or increased overhead costs."

SecureAuth 2-Factor as a Service is the only cost-effective, cloud-based solution that conducts authentication without any on-premises hardware or user information being moved or stored in the cloud.

"More organizations are migrating their information security towards authenticating access to mobile apps and cloud resources making it important that we partner with solution providers that offer the most advanced technology in authentication and identity management," stated Reinier Landsman, Managing Partner, at Cert2Connect, a leading IT security advisory firm serving Europe. "We have found SecureAuth solutions to ideally meet the needs of the European market, from large enterprises who want a quicker method of deployment from a single platform, and mid-market organizations who are looking for a cost-effective cloud authentication service. Together, our goal is to ensure resources are protected while being convenient for end users."

"Our mission is to strengthen the authentication process while making it seamless for end-users to validate their identities and obtain access," commented Garret Grajek, Chief Technology Officer at SecureAuth Corporation. "Our solution addresses the entire authentication process, from credential creation to identity assertion, lowering the risks of attack and eliminating the need for multiple point solution products."

SecureAuth was recognized as a "Visionary" by research and advisory firm Garter, Inc. in its December 2013 Magic Quadrant for User Authentication by Ant Allan, and was also rated "positive" in Gartner's MarketScope for Web Access Management by Gregg Kreizman, published November 15, 2013.

Media interested in meeting with Craig Lund, CEO, and Garret Grajek, CTO, SecureAuth, at the Gartner IAM Summit taking place at the Park Plaza Westminster Bridge, London, on the 17th and 18th of March, should contact Ina Schmidt using the contact details below.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Gartner Identity & Access Management Summit 2014
The Gartner Identity and Access Management Summit is the only event that focuses entirely on the technology, tools, and techniques needed to establish successful, mature IAM programmes. Attendees will learn best practices and how to make the business case for the advantages IAM acan bring, while minimising expenditure and maximising value for their organisations. For further information about the Gartner Identity & Access Management Summit 2014 taking place on 17-18 March, in London, please visit europe.gartner.com/iam. You can also follow the event on Twitter at http://twitter.com/Gartner_inc using #GartnerIAM.

About SecureAuth
Located in Irvine, California, SecureAuth is a technology leader providing 2-Factor Access Control to mobile, cloud, web, and network resources, serving over 10 million users worldwide.

Add to Digg Bookmark with del.icio.us Add to Newsvine

UK Media Contact:
Ina Schmidt
European Partner Solutions
[email protected]
Tel: +44 151 625 4823
Mob: +44 772 532 6146

Investor Contact:
Thomas C. Stewart
Chief Financial Officer
SecureAuth
[email protected]
Tel: + 1 949-777-6959

USA Media Contact:
Gina Ray
Ray Public Relations
[email protected]
Tel: +1 949-370-0941

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Existing Big Data solutions are mainly focused on the discovery and analysis of data. The solutions are scalable and highly available but tedious when swapping in and swapping out occurs in disarray and thrashing takes place. The resolution for thrashing through machine learning algorithms and support nomenclature is through simple techniques. Organizations that have been collecting large customer data are increasingly seeing the need to use the data for swapping in and out and thrashing occurs ...
SYS-CON Events announced today that Datera, that offers a radically new data management architecture, has been named "Exhibitor" of SYS-CON's 21st International Cloud Expo ®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datera is transforming the traditional datacenter model through modern cloud simplicity. The technology industry is at another major inflection point. The rise of mobile, the Internet of Things, data storage and Big...
When you focus on a journey from up-close, you look at your own technical and cultural history and how you changed it for the benefit of the customer. This was our starting point: too many integration issues, 13 SWP days and very long cycles. It was evident that in this fast-paced industry we could no longer afford this reality. We needed something that would take us beyond reducing the development lifecycles, CI and Agile methodologies. We made a fundamental difference, even changed our culture...
As many know, the first generation of Cloud Management Platform (CMP) solutions were designed for managing virtual infrastructure (IaaS) and traditional applications. But that’s no longer enough to satisfy evolving and complex business requirements. In his session at 21st Cloud Expo, Scott Davis, Embotics CTO, will explore how next-generation CMPs ensure organizations can manage cloud-native and microservice-based application architectures, while also facilitating agile DevOps methodology. He wi...
In his opening keynote at 20th Cloud Expo, Michael Maximilien, Research Scientist, Architect, and Engineer at IBM, discussed the full potential of the cloud and social data requires artificial intelligence. By mixing Cloud Foundry and the rich set of Watson services, IBM's Bluemix is the best cloud operating system for enterprises today, providing rapid development and deployment of applications that can take advantage of the rich catalog of Watson services to help drive insights from the vast t...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
For financial firms, the cloud is going to increasingly become a crucial part of dealing with customers over the next five years and beyond, particularly with the growing use and acceptance of virtual currencies. There are new data storage paradigms on the horizon that will deliver secure solutions for storing and moving sensitive financial data around the world without touching terrestrial networks. In his session at 20th Cloud Expo, Cliff Beek, President of Cloud Constellation Corporation, d...
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
Historically, some banking activities such as trading have been relying heavily on analytics and cutting edge algorithmic tools. The coming of age of powerful data analytics solutions combined with the development of intelligent algorithms have created new opportunities for financial institutions. In his session at 20th Cloud Expo, Sebastien Meunier, Head of Digital for North America at Chappuis Halder & Co., discussed how these tools can be leveraged to develop a lasting competitive advantage ...
From 2013, NTT Communications has been providing cPaaS service, SkyWay. Its customer’s expectations for leveraging WebRTC technology are not only typical real-time communication use cases such as Web conference, remote education, but also IoT use cases such as remote camera monitoring, smart-glass, and robotic. Because of this, NTT Communications has numerous IoT business use-cases that its customers are developing on top of PaaS. WebRTC will lead IoT businesses to be more innovative and address...
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, will provide a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to ...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business - from apparel to energy - is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, will discuss th...
Recently, IoT seems emerging as a solution vehicle for data analytics on real-world scenarios from setting a room temperature setting to predicting a component failure of an aircraft. Compared with developing an application or deploying a cloud service, is an IoT solution unique? If so, how? How does a typical IoT solution architecture consist? And what are the essential components and how are they relevant to each other? How does the security play out? What are the best practices in formulating...
Given the popularity of the containers, further investment in the telco/cable industry is needed to transition existing VM-based solutions to containerized cloud native deployments. The networking architecture of the solution isolates the network traffic into different network planes (e.g., management, control, and media). This naturally makes support for multiple interfaces in container orchestration engines an indispensable requirement.