Welcome!

News Feed Item

SecureAuth Expands European Operations

Provides Award-Winning 2-Factor Authentication With Single Sign-On Capabilities and Cloud-Based Authentication to Meet Unique Demands of the Region

EGHAM, UNITED KINGDOM -- (Marketwired) -- 03/14/14 -- SecureAuth, a leading provider of 2-Factor Access Control, today announced from the Gartner Identity and Access Management London Summit 2014 that it is expanding its sales operations in Europe, with its award-winning solutions, SecureAuth IdP and SecureAuth 2-Factor as a Service.

SecureAuth IdP was recently awarded the "Best Mobile Identity Solution" at the Global Mobile Awards 2014, announced during Global World Congress in Barcelona, Spain; and was commended by the judges as, "An excellent, successful approach to enterprise user authentication, and a solution to problems that enterprises are desperate to solve."

"Rather than cumbersome and expensive authentication solutions, we offer flexible and more secure options for managing users' identities," comments Craig Lund, Chief Executive Officer at SecureAuth Corporation. "Organizations can use SecureAuth to control identities and access for mobile, cloud, web apps, and VPN resources without hassle or increased overhead costs."

SecureAuth 2-Factor as a Service is the only cost-effective, cloud-based solution that conducts authentication without any on-premises hardware or user information being moved or stored in the cloud.

"More organizations are migrating their information security towards authenticating access to mobile apps and cloud resources making it important that we partner with solution providers that offer the most advanced technology in authentication and identity management," stated Reinier Landsman, Managing Partner, at Cert2Connect, a leading IT security advisory firm serving Europe. "We have found SecureAuth solutions to ideally meet the needs of the European market, from large enterprises who want a quicker method of deployment from a single platform, and mid-market organizations who are looking for a cost-effective cloud authentication service. Together, our goal is to ensure resources are protected while being convenient for end users."

"Our mission is to strengthen the authentication process while making it seamless for end-users to validate their identities and obtain access," commented Garret Grajek, Chief Technology Officer at SecureAuth Corporation. "Our solution addresses the entire authentication process, from credential creation to identity assertion, lowering the risks of attack and eliminating the need for multiple point solution products."

SecureAuth was recognized as a "Visionary" by research and advisory firm Garter, Inc. in its December 2013 Magic Quadrant for User Authentication by Ant Allan, and was also rated "positive" in Gartner's MarketScope for Web Access Management by Gregg Kreizman, published November 15, 2013.

Media interested in meeting with Craig Lund, CEO, and Garret Grajek, CTO, SecureAuth, at the Gartner IAM Summit taking place at the Park Plaza Westminster Bridge, London, on the 17th and 18th of March, should contact Ina Schmidt using the contact details below.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Gartner Identity & Access Management Summit 2014
The Gartner Identity and Access Management Summit is the only event that focuses entirely on the technology, tools, and techniques needed to establish successful, mature IAM programmes. Attendees will learn best practices and how to make the business case for the advantages IAM acan bring, while minimising expenditure and maximising value for their organisations. For further information about the Gartner Identity & Access Management Summit 2014 taking place on 17-18 March, in London, please visit europe.gartner.com/iam. You can also follow the event on Twitter at http://twitter.com/Gartner_inc using #GartnerIAM.

About SecureAuth
Located in Irvine, California, SecureAuth is a technology leader providing 2-Factor Access Control to mobile, cloud, web, and network resources, serving over 10 million users worldwide.

Add to Digg Bookmark with del.icio.us Add to Newsvine

UK Media Contact:
Ina Schmidt
European Partner Solutions
[email protected]
Tel: +44 151 625 4823
Mob: +44 772 532 6146

Investor Contact:
Thomas C. Stewart
Chief Financial Officer
SecureAuth
[email protected]
Tel: + 1 949-777-6959

USA Media Contact:
Gina Ray
Ray Public Relations
[email protected]
Tel: +1 949-370-0941

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera M...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of (at least) three separate application components: the software embedded in the device, the back-end service, and the mobile application for the end user’s controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target –...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abil...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...