SC Awards

Finalists: Best Authentication Technology

The ability to confirm that an individual or device is indeed cleared to access a network became all the more critical for businesses during the last year, as vast segments of the workforce transitioned to home offices and adversaries sought to take advantage of hasty digital transformation efforts.

The following products are recognized for enhancing security to end-users or devices to help ensure a company's most critical assets do not fall into the wrong hands.

FINALIST | BEST AUTHENTICATION TECHNOLOGY

DUO SECURITY
Company: Cisco Systems, Inc.
Noteworthy: Uses a combination of multi-factor authentication, device health checks, adaptive policies and automatic anomalous login detection to shield applications from compromised credentials and unsafe devices, ensuring only trusted users and trustworthy devices can access applications and services.

FINALIST | BEST AUTHENTICATION TECHNOLOGY

OKTA IDENTITY CLOUD
Company: Okta
Noteworthy: Newly launched features include passwordless login via biometric factors from any device or location to any Okta-managed app, and the ability for developers to embed custom and branded passwordless sign-in flows with passwordless capabilities into mobile applications.

FINALIST | BEST AUTHENTICATION TECHNOLOGY

PASSWORDLESS IDENTITY PLATFORM
Company: Beyond Identity
Noteworthy: Replaces passwords with fundamentally secure X.509-based certificates and extends a "chain of trust" to the Beyond Identity Authenticator on endpoint devices of the user's choosing.

FINALIST | BEST AUTHENTICATION TECHNOLOGY

PORTALGUARD IDAAS
Company: BIO-key International
Noteworthy: Supports 15+ authentication methods and adaptive authentication, allowing administrators and users to decide which methods work best to support their security policies and access scenarios.

FINALIST | BEST AUTHENTICATION TECHNOLOGY

SECUREAUTH
Company: SecureAuth
Noteworthy: By collecting detailed granular threat data during each authentication request, can enrich security information and event management or other system to cut through the noise of network and endpoint alerts to decrease threat-detection time.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.