VeriSign Identity Protection Authentication Service
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
VeriSign takes top honors for its standards-based, partially hosted multifactor authentication product. Respondents lauded its secure credentials and scalability. Recently VeriSign has made strides on mobile authentication, supporting 200-plus devices, and added self-service features, such as password retrieval. "Customers value the idea of self-service capabilities and heterogeneous mobile device support," said Burton Group Senior Analyst Mark Diodati.
[SILVER] RSA SecurID
RSA, The Security Division of EMC
The venerable SecurID line scored highly across the board, with the exception of vendor service and support. Today the product family includes software- and hardware-based authenticators (tokens), request-management agents and various servers. RSA claims it's the only vendor that automatically changes user passwords every 60 seconds, and publicizes its use of AES encryption.
When engaging competitors, Entrust touts IdentityGuard's affordability, but respondents' ranked it highest for integration and compatibility; it lagged in vendor service and support. The enterprise product line features a range of strong authentication options (physical, non-physical and mobile) authenticators (e-grids, digital certificates and tokens), native 802.1X wireless support and compatibility with BlackBerrys and iPhones.
Even in 2009, it's rare for any multifactor authentication product to meets all of an organization's needs. Diodati says three vexing issues--varied user constituencies; emerging Web applications; and mobile platform support--are forcing companies to mix and match technologies. Success demands clearly defined business problems. "If an organization doesn't have the intestinal fortitude to do that, it'll have to wait." -- Mark Diodati, senior analyst, Burton Group
2009 READERS' CHOICE AWARDS
Introduction and Methodology
Best Antimalware Products
Best Application Security Products
Best Authentication Products
Best Data Loss Prevention Products
Best Email Security Products
Best Identity and Access Management Products
Best Intrusion Detection and Prevention Products
Best Mobile Data Security Products
Best Network Access Control Products
Best Network Firewalls
Best Risk and Policy Management Products
Best Secure Remote Access Products
Best Security Information and Event Management Products
Best Unified Threat Management Products
Best Vulnerability Management Products
Best Web Security Gateway Products
Best Wireless Security Products