|By Marketwired .||
|March 14, 2014 04:00 AM EDT||
EGHAM, UNITED KINGDOM -- (Marketwired) -- 03/14/14 -- SecureAuth, a leading provider of 2-Factor Access Control, today announced from the Gartner Identity and Access Management London Summit 2014 that it is expanding its sales operations in Europe, with its award-winning solutions, SecureAuth IdP and SecureAuth 2-Factor as a Service.
SecureAuth IdP was recently awarded the "Best Mobile Identity Solution" at the Global Mobile Awards 2014, announced during Global World Congress in Barcelona, Spain; and was commended by the judges as, "An excellent, successful approach to enterprise user authentication, and a solution to problems that enterprises are desperate to solve."
"Rather than cumbersome and expensive authentication solutions, we offer flexible and more secure options for managing users' identities," comments Craig Lund, Chief Executive Officer at SecureAuth Corporation. "Organizations can use SecureAuth to control identities and access for mobile, cloud, web apps, and VPN resources without hassle or increased overhead costs."
SecureAuth 2-Factor as a Service is the only cost-effective, cloud-based solution that conducts authentication without any on-premises hardware or user information being moved or stored in the cloud.
"More organizations are migrating their information security towards authenticating access to mobile apps and cloud resources making it important that we partner with solution providers that offer the most advanced technology in authentication and identity management," stated Reinier Landsman, Managing Partner, at Cert2Connect, a leading IT security advisory firm serving Europe. "We have found SecureAuth solutions to ideally meet the needs of the European market, from large enterprises who want a quicker method of deployment from a single platform, and mid-market organizations who are looking for a cost-effective cloud authentication service. Together, our goal is to ensure resources are protected while being convenient for end users."
"Our mission is to strengthen the authentication process while making it seamless for end-users to validate their identities and obtain access," commented Garret Grajek, Chief Technology Officer at SecureAuth Corporation. "Our solution addresses the entire authentication process, from credential creation to identity assertion, lowering the risks of attack and eliminating the need for multiple point solution products."
SecureAuth was recognized as a "Visionary" by research and advisory firm Garter, Inc. in its December 2013 Magic Quadrant for User Authentication by Ant Allan, and was also rated "positive" in Gartner's MarketScope for Web Access Management by Gregg Kreizman, published November 15, 2013.
Media interested in meeting with Craig Lund, CEO, and Garret Grajek, CTO, SecureAuth, at the Gartner IAM Summit taking place at the Park Plaza Westminster Bridge, London, on the 17th and 18th of March, should contact Ina Schmidt using the contact details below.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
About Gartner Identity & Access Management Summit 2014
The Gartner Identity and Access Management Summit is the only event that focuses entirely on the technology, tools, and techniques needed to establish successful, mature IAM programmes. Attendees will learn best practices and how to make the business case for the advantages IAM acan bring, while minimising expenditure and maximising value for their organisations. For further information about the Gartner Identity & Access Management Summit 2014 taking place on 17-18 March, in London, please visit europe.gartner.com/iam. You can also follow the event on Twitter at http://twitter.com/Gartner_inc using #GartnerIAM.
Located in Irvine, California, SecureAuth is a technology leader providing 2-Factor Access Control to mobile, cloud, web, and network resources, serving over 10 million users worldwide.
UK Media Contact:
European Partner Solutions
Tel: +44 151 625 4823
Mob: +44 772 532 6146
Thomas C. Stewart
Chief Financial Officer
Tel: + 1 949-777-6959
USA Media Contact:
Ray Public Relations
Tel: +1 949-370-0941
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 7, 2016 05:15 AM EST Reads: 1,042
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 7, 2016 04:00 AM EST Reads: 858
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
Dec. 7, 2016 02:00 AM EST Reads: 617
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Dec. 7, 2016 01:45 AM EST Reads: 6,162
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Dec. 7, 2016 01:15 AM EST Reads: 1,874
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Dec. 7, 2016 01:00 AM EST Reads: 1,615
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Dec. 7, 2016 12:45 AM EST Reads: 3,934
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Dec. 7, 2016 12:45 AM EST Reads: 1,240
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dec. 7, 2016 12:15 AM EST Reads: 1,025
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Dec. 7, 2016 12:15 AM EST Reads: 1,372
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Dec. 7, 2016 12:00 AM EST Reads: 1,268
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Dec. 7, 2016 12:00 AM EST Reads: 2,126
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Dec. 6, 2016 11:45 PM EST Reads: 747
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 6, 2016 10:15 PM EST Reads: 1,152
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
Dec. 6, 2016 09:15 PM EST Reads: 352