Authentication ensures users or devices are known and trusted to access data and resources

Authentication is the process of verifying the identity of a user or validating a connecting device. Passwords, tokens and shared secrets are used to ensure that a user and/or device has the right to access data and resources on a computer system or network.

What are some examples of authentication tools?

  • Simple username and password.
  • Challenge-response devices, such as an RSA token.
  • 2FA, such as a USB key with a PKI certificate, a mobile device, and a password.
  • Biometric, such as a fingerprint scanner.

Who are the key vendors for authentication?

  • Authentication vendors within the broader “Identity and Access Management’ category have focused solutions:
  • Authentication Solutions: Validate identities for users and consumers. Examples are Callsign, Centrify, Google, Duo
  • IDaaS (Identity as a Service): Cloud service for validating identities of users and consumers. Examples are OneLogin, Okta, and Microsoft
  • Privileged Management: Help control and monitor the access of data and resources of privileged users (those with administrative access to systems). Examples are CyberArk, One Identity, and Beyond Trust.
  • Identity Governance: These solutions help organizations holistically manage the access rights of users across an enterprise. Examples are Sailpoint, SIMEIO, and Help Systems.
  • Consumer Identity: As the category name indicates, these solutions are focused on providing access rights to consumers accessing their services and products. Examples include LoginRadius, Verato, Akamai, and

Prevent millions of $ of privacy risks. Learn how.

We take privacy seriously.  While we promise not to sell your personal data, we may send product and company updates periodically. You can opt-out or make changes to our communication updates at any time.