Readers' Choice 2009 Best Authentication Products

Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards.

[GOLD]
VeriSign Identity Protection Authentication Service
VeriSign

VeriSign takes top honors for its standards-based, partially hosted multifactor authentication product. Respondents lauded its secure credentials and scalability. Recently VeriSign has made strides on mobile authentication, supporting 200-plus devices, and added self-service features, such as password retrieval. "Customers value the idea of self-service capabilities and heterogeneous mobile device support," said Burton Group Senior Analyst Mark Diodati.

[SILVER] RSA SecurID
RSA, The Security Division of EMC

The venerable SecurID line scored highly across the board, with the exception of vendor service and support. Today the product family includes software- and hardware-based authenticators (tokens), request-management agents and various servers. RSA claims it's the only vendor that automatically changes user passwords every 60 seconds, and publicizes its use of AES encryption.

[BRONZE]
Entrust IdentityGuard
Entrust

When engaging competitors, Entrust touts IdentityGuard's affordability, but respondents' ranked it highest for integration and compatibility; it lagged in vendor service and support. The enterprise product line features a range of strong authentication options (physical, non-physical and mobile) authenticators (e-grids, digital certificates and tokens), native 802.1X wireless support and compatibility with BlackBerrys and iPhones.

[TRENDS]
Even in 2009, it's rare for any multifactor authentication product to meets all of an organization's needs. Diodati says three vexing issues--varied user constituencies; emerging Web applications; and mobile platform support--are forcing companies to mix and match technologies. Success demands clearly defined business problems. "If an organization doesn't have the intestinal fortitude to do that, it'll have to wait." -- Mark Diodati, senior analyst, Burton Group


2009 READERS' CHOICE AWARDS

  Introduction and Methodology
  Best Antimalware Products
  Best Application Security Products
  Best Authentication Products
  Best Data Loss Prevention Products
  Best Email Security Products
  Best Identity and Access Management Products
  Best Intrusion Detection and Prevention Products
  Best Mobile Data Security Products
  Best Network Access Control Products
  Best Network Firewalls
  Best Risk and Policy Management Products
  Best Secure Remote Access Products
  Best Security Information and Event Management Products
  Best Unified Threat Management Products
  Best Vulnerability Management Products
  Best Web Security Gateway Products
  Best Wireless Security Products
This was first published in September 2009

Dig deeper on Two-Factor and Multifactor Authentication Strategies

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close