Analyst Reports

Key Cybersecurity Topics Covering Today’s Dynamic IT Landscape

Analyst Reports

Download key analyst reports to stay up-to-date on how SecureAuth interacts with current industry trends and cutting-edge technologies in identity and cybersecurity.

IDC Perspective: The Death of 2FA and the Birth of Modern Authentication

Published September 2017: Two-factor authentication and MFA were certainly significant improvements over the use of passwords for authentication. However, the definition of MFA was born in a different “day” and is based upon technology and approaches that are 20 years old. This report, written by IDC Research Director Frank Dickson, discusses how technology buyers are strongly encouraged to look beyond the MFA standard and instead, consider a modern authentication approach.

Magic Quadrant for Access Management, WorldWide 2017

Published June 2017: The Magic Quadrant provides an overview of 15 different access management vendors that can be deployed in cloud, on-prem, and hybrid environments and support workforce B2E, B2B, and B2C use cases.

KuppingerCole names SecureAuth as Leader for Product and Innovation in Adaptive Authentication

Published April 2017: SecureAuth is named Leader for its secure and innovative solutions that are both modern and flexible as they implement rapidly, scale effortlessly, and adapt to each customer’s unique needs and infrastructure. "As a pure play adaptive authentication product, SecureAuth is one of the most compelling choices. Their broad support of innovative MFA, federation, and directory options is outstanding. Wide support of IAM standards allows interoperability with many other vendors’ products.” KuppingerCole’s Leadership Compass for Adaptive Authentication recognizes leaders in innovation, product features and market reach for Adaptive Authentication.

Busy SecureAuth Bolsters Flagship IdP with Full Cloud-Based IDaaS, Gets a New CEO

Published March 2017: The most recent updates to SecureAuth’s lineup include protection against attackers looking to exploit phone numbers and mobile devices used as a second authentication factor, the launch of a fully cloud-based identity service, and COO Jeff Kukowski taking the reins as CEO.

IDC Link: The Era of the Password Has Passed

Published December 2016: The need to strengthen enterprise authentication is almost universally acknowledged. Security professionals are quick to look at two-factor and multi-factor solutions to accomplish the goal; clearly, the addition of second and third factors addresses the need. However, there is a failure in the process to consider the value of the first factor in such solutions, the value of the password. In this Link, IDC examines the value of the password and its limited value in the future of enterprise network security.

IDC Technology Spotlight: Dynamic User Authentication: Smarter Security to Protect User Authentication

Published April 2016:  This report is adapted from Worldwide Identity and Access Management Forecast, 2015–2019 by Pete Lindstrom, IDC and explores the trends in technology, authentication, and the threat landscape that are driving a need for stronger user access control.





Guide to User Authentication

Published February 2016: Focused on strategies covering the identity and access management space, the Guide to User Authentication explores how organizations can adopt flexible and pain-free technologies to:

  • strengthen security  
  • provide good user experience
  • reduce total cost of ownership

Download the report for Gartner research along with SecureAuth's own insight to cutting-edge technologies empowering organizations to determine identities with confidence.

SecureAuth Sets Out its Stall in the Competitive European IAM Marketplace

Published February 2016: IDC met with SecureAuth to understand the perspective of a new entrant seeking to expand within the Identity and Access Management (IAM) software market. The IAM sector is dominated by traditional giants of the security field such as IBM, RSA and CA (see IDC's upcoming Vendor Share report for the Western European security software market, #EMEA40473316). However, it is a sector where the shifting requirements of next generation security are causing a change of direction in terms of customer needs. SecureAuth can count itself among a group of emerging challengers that aim to ride this wave of change to disrupt the hegemony of the market giants.

SecureAuth Bolsters Threat Detection with BehavioSec Partnership

Published November 2015: SecureAuth is once again pushing the limits of Adaptive Authentication by introducing behavioral biometrics. With more authentication options than any other vendor, SecureAuth is uniquely positioned to inspect authentication attempts without impacting users. If certain risk factors are detected, you can step-up authentication for increased security. Behavioral biometrics provide yet another method for detecting threats with the ability to monitor and analyze keystrokes, mouse movements, and touch dynamics.

Using Identity to Create Next Generation, Risk-based Access Management

Published August 2015: In today's threat landscape, cyber attackers are capitalizing on a golden opportunity to bypass traditional perimeter security controls and monitoring. Organizations need a better means of managing their perimeter and their identities. They need to move beyond traditional perimeter defenses and access management tools to expand their ability to protect identities and detect bad actors. In this paper, David Monahan Research Director of Security & Risk Management at Enterprise Management Associates discusses the findings of his recent Data-driven Security Reloaded (DDSR) survey of network, security, risk, and fraud personnel and explores how and why becoming an identity provider is an important and growing need in the connected world.

KuppingerCole Report

Published March 2015: Written by Kuppinger Cole analyst and industry veteran by Dave Kearns, this report takes a look at SecureAuth IdP in the context of "Cloud IAM" or Cloud Identity and Access Management and how it can improve both security and ease-of-use for access control.