Quantum Secure Named a Cool Vendor by Leading Analyst Firm

Quantum Secure Named a Cool Vendor by Leading Analyst Firm

Once a year Gartner, Inc., a leading information technology research and advisory company, identifies “Cool Vendors”, companies who are “transforming the way businesses operate and consumers engage with technology.”

Quantum Secure Named a Cool Vendor by Leading Analyst FirmQuantum Secure, a provider of enterprise-grade Physical Identity and Access Management (PIAM) solutions, today announced they have been included in the IT/OT Alignment and Integration* category of Gartner’s 2013 list of “Cool Vendors.” The company was also named in Gartner’s Special Report of “Cool Vendors in Asia/Pacific”** 2013 in the same category. 

Gartner’s “Cool Vendor” research recognizes smaller, emerging companies that are interesting and unique, and offer highly-original and innovative technology or services that are making a difference in their market. According to Gartner’s report, the rising interest among CIOs and the significance of IT/OT integration are supporting a wave of innovative providers that are helping to ease the integration headaches of the disparate IT and OT architectures.

“Quantum Secure’s growth and achievements in the field of IT/OT alignment and integration are built on our software engineering expertise and an in-depth understanding of how and why the merger of physical and logical security cultures can enhance business operations,” said Ajay Jain, Quantum Secure president and CEO. “We believe the designation by Gartner as a “Cool Vendor” is a hallmark distinction for our brand, and we are extremely honored.”

Today’s security requirements demand a comprehensive security infrastructure that includes both the physical and logical security spectrums. Crucial to this need is an end-to-end solution that manages identities, compliance and events across disparate physical security systems. Quantum Secure’s SAFE suite of software products effectively addresses these challenges with best practice processes that reduce both costs and risks.

*Gartner, Cool Vendors in IT/OT Alignment and Integration, 2013, April 23, 2013
**Cool Vendors in Asia/Pacific, 2013, May 7, 2013.

Featured

  • From the Most Visible to the Less Apparent

    The Cybersecurity and Infrastructure Security Agency (CISA) states “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and national public health or safety or any combination thereof.” Read Now

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.