Gartner’s Magic Quadrant for User Authentication

Last updated: 17 December 2019

Authentication is one of the most prominent issues facing the digital world right now. You only have to glance around the Infosecurity conference this year to witness how often the term is displayed and how intensely it’s discussed. With security fiascos such as Heartbleed still fresh in all of our minds, there’s arguably never been a bigger demand for secure and trusted two factor authentication solutions for all kinds of businesses and end users, especially as too many continue to be lax with their passwords.

So, what can we do to ensure user authentication is in the right hands? For starters, you can turn to independent opinion. The best advice is nearly always from an independent source; a source that’s trusted and dedicated to objectiveness and high quality. Fortunately, this service is provided from Stamford-based Gartner Inc, an analyst organization that specializes in providing the best, objective technology related research and advice. Every year, Gartner Inc performs an independent, in-depth analysis of security vendors in the user authentication marketplace. The results of this analysis are captured in a long format report as well as a graphical representation of how the companies were rated. The two main factors of influence for this analysis are ‘ability to execute’ and ‘completeness of vision’, as you’ll see in the graph below.

As you’ll also see, Gartner categorizes vendors into four quadrants “niche players,” visionaries,” “challengers” or “leaders.” We’re understandably pleased to be in the leaders quadrant; but what’s important here is not necessarily where we are, but that user authentication vendors in general are receiving this level of scrutiny. This type of process is a must if we are to progress towards stronger and more convenient security solutions becoming available to businesses and end users alike. For your own copy of Gartner’s Magic Quadrant for User Authentication, please make your request here.

And if you’re at keen to see some examples of why we’re in this ‘Magic Quadrant’, come see at as Infosecurity 2014 at Stand D31. A whole range of our solutions for user authentication will be available for demo; from mobile banking, to OTP (One Time Password) innovations as well as NFC two factor authentication with your corporate card, or just with your NFC phone.  For more information, feel free to ask our team on the stand, or tweet us @Gemalto.

Leave a Reply

Your email address will not be published. Required fields are marked *