IRVINE, CA--(Marketwired - Dec 16, 2013) - SecureAuth, leading provider of 2-Factor Access Control, is delighted to announce its recognition as a 'Visionary' by research and advisory firm Garter, Inc. in its Magic Quadrant for User Authentication published Dec. 9.
"We are delighted to be recognized by Gartner, Inc.," said Craig Lund, Chief Executive Officer at SecureAuth. "This sort of feedback cements our belief that we have designed the most integrated access control system on the market for mobile, web, network, and SaaS-based access management, thanks to our simple, contextual authentication, pricing, and customer service."
Twenty different authentication methods come out-of-the-box with SecureAuth IdP, including SecureAuth's patented, heuristic-based Device Fingerprinting, which pulls unique characteristics from any desktop or mobile device and registers them to specific user profiles to decrease friction for subsequent authentication.
SecureAuth's all-inclusive authentication solution has also excelled in mobile security, enabling true BYOD for enterprises by validating users on any laptop, smartphone, or tablet; and remains to be the only authentication vendor that provides SSO into all mobile, cloud, web, and network resources.
Organizations can learn more by contacting SecureAuth or applying for a free trial.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Located in Irvine, California, SecureAuth is a technology leader providing 2-Factor Access Control to mobile, cloud, web, and network resources, serving over 10 million users worldwide. The SecureAuth IdP all-in-one, completely scalable solution manages and enforces access based on existing user entitlements. For the latest insight on enterprise security, follow the SecureAuth Blog, follow @SecureAuth on Twitter, or visit www.secureauth.com for additional information.