February 21, 2013
Accells Technologies Recognized with Top Innovator Award
accells technologies, a cybersecurity innovator of Mobile ID and Smart Authentication services, recently announced that it has been recognized with the Top Innovator Award in the Technology Section at the Venture Summit West 2013. An official said that accells had the best presentation among the 50 Top Technology Innovators in its section.
By offering mobile ID and smart authentication services, accells addresses the lack of security inherent in user-managed passwords and the significant limitations of token/one-time-password based solutions. Via one secure mobile app, accells enables people to use their smartphone as a mobile ID for smart identification and access to any cloud, Web, VPN, social media or mobile service in any context - online, mobile, call center, or at the POS.
accells delivers a usability that people love, smart adaptive authentication, low total cost of ownership, applicability beyond securing access, and seamless protection of mobile transactions against phishing and trojans. accells secures remote access, cloud service access and single sign-on use cases against cyber threats. Beyond access, accells enables easy identification, transaction verification, smart SSO, approval and secure sharing workflows as well as secure data capture and feedback.
“We are honored by this recognition in the investor community“, said accells CEO Eckhard Ortwein. “The shelf life of existing authentication methods has expired, and investors appreciate our new, disruptive and patented authentication solution.”
Meanwhile, accells recently announced that it is expanding its team to reach the broad range of partners and companies, large and small, who can use its solutions to build access and transaction security, while boosting confidence. Covering remote access, cloud service access and the protection of existing single sign-on (SSO) mechanisms, accells secures standard login and SSO use cases. In addition, accells enables easy identification and secure authentication, transaction verification, signing and approval workflows, secure data capture and feedback as well as secure collaboration and sharing flows.
Edited by Brooke Neuman