SecureW2 dominates Cybersecurity Excellence Awards in three categories

May 13, 2024
1 min read



SecureW2 Article Summary

TLDR:

SecureW2 has been named the winner of the 2024 Cybersecurity Excellence Awards in the Digital Certificates, Network Security, and Passwordless Solutions categories. The platform allows organizations to automate access for Wi-Fi, Apps, VPN, and Desktop Logon, offering a Zero Trust security model. SecureW2’s passwordless technology has helped organizations improve network security and identity and device management infrastructure.

Article Summary:

SecureW2, a provider of passwordless security platforms, has won awards in the Digital Certificates, Network Security, and Passwordless Solutions categories at the 2024 Cybersecurity Excellence Awards. The platform leverages certificate-based authentication to verify identity and devices, preventing credential theft and enabling Device Trust to enhance security.

SecureW2’s cloud-native architecture integrates with identity and management infrastructure to automate access and authorization, offering real-time security and compliance data. The platform caters to organizations of all sizes, providing a simplified and cost-effective certificate-driven security solution.

CEO Bert Kashyap expressed gratitude for winning the awards, highlighting how SecureW2 aims to eliminate credentials, enhance network protection, and improve user and admin experiences. The platform’s expansion includes new features such as ACME device attestation in the Apple ecosystem and integration with Microsoft’s Azure CBA.

Founded in 2014, SecureW2 recently secured an $84 million investment from Insight Partners and continues to innovate in the passwordless security space. The platform’s focus on user-centric security has helped hundreds of organizations worldwide to safeguard their networks, applications, and devices.


Latest from Blog

Apache’s OFBiz gets new fix for RCE exploits

TLDR: Apache released a security update for OFBiz to patch vulnerabilities, including a bypass of patches for two exploited flaws. The bypass, tracked as CVE-2024-45195, allows unauthenticated remote attackers to execute code