SecureAuth Named a Leader in KuppingerCole Leadership Compass Report for Customer Identity and Access Management
SecureAuth First to Deliver Adaptive and Multi-Factor Authentication for Windows and Mac Login

SecureAuth First to Deliver Adaptive and Multi-Factor Authentication for Windows and Mac Login

Solution continues path to passwordless by fast-tracking secure access to Windows and Mac with unmatched user experience.

Irvine, Calif. – July 11, 2018SecureAuth, the leader in Identity Security, today announced the immediate availability of Login for Windows and Login for Mac, two new products that provide Adaptive and Multi-Factor Authentication (MFA) for users logging into servers, desktops, and laptops.

The product releases extend SecureAuth’s authentication leadership in three key ways:

  • No other vendor offers Adaptive Access Control for operating system login, which allows organizations to implement risk-based authentication to improve security and usability
  • Login for Windows and Login for Mac support a divergent and uniquely broad set of authentication methods, enabling organizations to use the right factors for each part of their user population
  • The capabilities give rise to the category of Identity Security Automation – creating intelligent intersections between identity and security to accelerate cybersecurity

Tweet This: SecureAuth announces adaptive authentication for Windows and Mac in next phase of #IdentitySecurityAutomation

“In most organizations, users log into a computer with only a password and gain access to a tremendous amount of sensitive data on that system and elsewhere on the network,” said Keith Graham, chief technology officer of SecureAuth. “By strongly authenticating a user at the initial login, we can trust that identity and eliminate ‘login friction’ from the rest of their day as they access other applications and systems. Adaptive authentication at the operating system layer also helps organizations better secure remote access to terminal services and ensure that attackers who steal administrator credentials can’t get into servers.”

Adaptive authentication provides the highest level of identity security without negatively impacting the user as risk checks – such as device recognition, geo-location, and threat detection services – are done behind the scenes. Multi-factor authentication methods, including Push-to-Accept and SMS one-time-passcodes, are required only if risks are detected.

“Digital transformation is rapidly impacting every industry; thus, enterprises need to modernize their access control while simultaneously creating positive user experiences,” said Frank Dickson, Research VP of Security Products at IDC. SecureAuth actively embraces IDC’s Modern Authentication view; Login for Windows and Mac represents an important part of this movement and highlights the company’s commitment to securing the enterprise with a comprehensive identity-based approach to the attack lifecycle.”

Passwordless for Laptops, Desktops, and Servers

The first releases of Login for Windows and Login for macOS continue SecureAuth’s vision of a completely passwordless enterprise. A subsequent release will extend SecureAuth’s existing passwordless capabilities to cover all versions of Windows in common use in enterprises today as well as macOS systems.

“It’s time to truly move beyond passwords. The only password which can’t be stolen is one that doesn’t exist. In the future, we will remove the password altogether from endpoint authentication, meaning no more lost, stolen or weak passwords, no more forced-password resets, and no more help-desk calls for forgotten passwords,” said Graham. “Offering Adaptive and Multi-Factor Authentication for Windows and Mac Login is the next step to deliver passwordless authentication to servers, desktops, and laptops for both Windows and Mac, improving security while providing a seamless user experience.”

About SecureAuth

SecureAuth is a respected a pioneer in adaptive authentication and Single Sign-On (SSO). Our mission is to accomplish what no other security technology vendor can claim: Secure the enterprise across all major threat vectors with an identity-based approach to the attack lifecycle. To learn more, visit, contact SecureAuth at, or follow us on Twitter (@SecureAuth), and LinkedIn.


SecureAuth |

Pin It on Pinterest