Partner Details

SecureAuth is a technology leader in universal identity enforcement for mobile devices, cloud applications and networks that serves hundreds of customers and over 10 million users worldwide. Its SecureAuth IdP products offer Global 5000 companies a uniquely extensible, enterprise-proven method of administering corporate identity governance on mobile devices, cloud-based applications, and networks. These all-in-one solutions provide IT departments with a simplified way of managing and enforcing access, authentication, approval and assertion based on existing user entitlements. SecureAuth IdP works anywhere and is completely scalable. For the latest insight on enterprise identity governance and issues follow the SecureAuth Blog, follow @SecureAuth on Twitter, or visit for additional information.

 Sponsored Events

Date Title
May 14  ‑ May 17, 2013 Congress

European Identity & Cloud Conference 2013

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.


Date Title Price
Mar 03, 2015

Executive View: SecureAuth IdP - 70844

SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing on both internal and external users that want to access to…

Feb 04, 2011

Vendor Report: SecureAuth Corporation - 70260

SecureAuth is a single-product vendor. The product SecureAuth IEP is a platform for a strong two-factor authentication based on X.509v3 certificates for web-based applications, federated…


Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.



Cognitive Security: The Future of Cybersecurity is Now

The proverbial Computing Troika that KuppingerCole has been writing about for years does not show any signs of slowing down. The technological trio of Cloud, Mobile and Social computing, as well as their younger cousin, the Internet of Things, have profoundly changed the way our society works. [...]

Latest Insights

Hot Topics


Learn more

Real-Time Security Intelligence & Big Data in Security

Traditional tools are still widely deployed by many organizations and in certain scenarios serve as a useful part of enterprise security infrastructures, but recent trends in the IT industry have largely made them obsolete. Continued deperimeterization of corporate networks because of adoption of cloud and mobile services, as well as emergence of many new legitimate communication channels with external partners has made the task of protecting sensitive corporate information more and more difficult. The focus of information security has gradually shifted from perimeter protection towards [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00