8965 Research Drive • CA 92618 Irvine
Phone: +1 (949) 777 69 59
SecureAuth is a technology leader in universal identity enforcement for mobile devices, cloud applications and networks that serves hundreds of customers and over 10 million users worldwide. Its SecureAuth IdP products offer Global 5000 companies a uniquely extensible, enterprise-proven method of administering corporate identity governance on mobile devices, cloud-based applications, and networks. These all-in-one solutions provide IT departments with a simplified way of managing and enforcing access, authentication, approval and assertion based on existing user entitlements. SecureAuth IdP works anywhere and is completely scalable. For the latest insight on enterprise identity governance and issues follow the SecureAuth Blog, follow @SecureAuth on Twitter, or visit www.gosecureauth.com for additional information.
|May 14 ‑ May 17, 2013||
European Identity & Cloud Conference 2013
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
|Mar 03, 2015||
Executive View: SecureAuth IdP - 70844
SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing on both internal and external users that want to access to…
|Feb 04, 2011||
Vendor Report: SecureAuth Corporation - 70260
SecureAuth is a single-product vendor. The product SecureAuth IEP is a platform for a strong two-factor authentication based on X.509v3 certificates for web-based applications, federated…
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Who will have access to what? In a complex world where everyone and everything – people, things and services - will be connected everywhere and anytime through a global cloud, IAM is going to remain one of the strongest means to protect enterprise security. Especially when firewalls as security perimeters are not sufficient any more. To take over the leading protection task, however, the IAM technology has to change fundamentally. Particularly with digital transformation of businesses, IAM moves into the center of operations. The mere defining of roles for individual access [...]