05.14.2018

Black Book Market Research Releases Results from Their Crowdsourced Client Experience Survey on Authorization and Authentication Solutions

Black Book Market Research LLC’s annual poll of cybersecurity products, services, outsourcing and consulting clients spanned 17 functional areas of cybersecurity including: Authorization and Authentication Solutions; Blockchain Solutions; Compliance and Risk Management Solutions; Cybersecurity Advisors and Consultants; Cybersecurity Training and Education; DDoS Attack Prevention; End Point Security Solutions,; Access Management; Firewall Networks; Data Encryption; Intrusion Protection Solutions; Threat Detection and Prevention; Network Security; Email Protection; and Cybersecurity Data Analytics.

The full listing of cybersecurity rankings in each category can be found at Black Book’s website.

“Cybersecurity is no longer considered solely an IT responsibility or a compliance issue,” said Doug Brown, founder of Black Book and lead researcher on the Q2 2018 study.

Black Book anticipates demand for outsourced information security, consulting and support to increase five times faster than security technology products and software purchases as job vacancies exceed qualified candidates.

Black Book Market Research LLC measures customer satisfaction across 18 copyrighted key performance indicators: Strategic Alignment of Vendor Offerings to the Client’s Mission and Goals; Innovation and Optimization; Training and Education; Client Relationships and Cultural Fit; Trust, Accountability, Ethics and Transparency; Breadth of Offerings; Deployment and Implementation; Customization; Integration and Interfaces, Interoperability and Connectivity; Scalability and Client Adaptability, Vendor Staff Expertise and Performance; Reliability; Brand Image and Marketing Communications; Marginal Value Adds; Vendor Financial Viability and Managerial Stability; Data Storage Services; Support and Customer Care; and Best of Breed Technology and Process Improvement.

In total, 2,464 cybersecurity system users and senior level managers participated over the seven-month crowdsourced survey.

In order, the top 10 of 20 ranked authorization and authentication solution cybersecurity firms this year are:

  1. FIREEYE
  2. SAILPOINT
  3. AVATIER
  4. SECUREAUTH
  5. AUTH0
  6. OPTIMAL IDM
  7. CROSSMATCH
  8. IMPRIVATA
  9. BETA SYSTEMS
  10. CENTRIFY

See all 20 companies at Black Book’s website.

About Black Book Market Research LLC

Black Book Market Research is the parent group for Black Book Rankings, a full-service healthcare-centric market research and public opinion research company. Founded in 2002, the company today serves a wide variety of prominent national and international clients. Black Book Rankings offers complete quantitative and qualitative research services, excelling in the design of customized surveys and research approaches to meet specific client needs in healthcare, pharmaceutics, biomedical devices, managed care, health insurance, and technology.

Black Book Market Research LLC, its founder, management and staff do not own or hold any financial interest in any of the vendors or public relations firms covered and encompassed in the surveys it conducts. Additionally, Black Book does not contract for, barter, exchange or accept direct services from any public relations firm mentioned in the rankings. Black Book reports the results of the collected satisfaction and client experience rankings in publication and to media prior to vendor/firm notification of rating results and does not solicit vendor/agency participation fees, review fees, inclusion or briefing charges, consultation requirements and/or vendor collaboration as Black Book polls’ clients.

Since 2010, Black Book Market Research LLC has polled the vendor and service firm satisfaction in the software/technology and managed services sectors around the globe.

For methodology, auditing, resources, comprehensive research, Black Book Market Research online.

Detailed results on the cybersecurity rankings, visit Black Book Market Research’s Health Data Security.

Source: Black Book Market Research

Tags

  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.