Table of Contents
Market Blossoms from Cyber-Driven Demand
Authentication establishes a bond of trust between an organization and the user who is requesting system access. Strong authentication refers to methods of authenticating users with a level of validation that is beyond that of simple username and password. The methods of strong authentication addressed in this report include Hardware One-Time Passwords (OTP), Software OTP, USB Key, and Biometrics. This report provides an analysis of the market for strong authentication including:
Four years of historical market sizing and five years of market forecast; Market shares for the market participants; Market description and market trends; Drivers and restraints; Individual company profiles of the market participants.
•Authentication establishes a bond of trust between an organization and the user who is requesting system access. Strong authentication refers to methods of authenticating users with a level of validation that is beyond that of simple username and password. The methods of strong authentication addressed in this report include Hardware One-Time Passwords (OTP), Software OTP, USB Key, and Biometrics.
•The total market for strong authentication grew to $X? billion in 2013, upX? percent from 2012.
•2013 was a “watershed” year for strong authentication in that biometrics became the largest segment of strong authentication technology. Much of the momentum in biometrics is being driven by the use of voice biometrics, especially in call center and interactive voice response (IVR) applications.
•The total market will grow to $X'billion by 2018, representing a compound annual growth rate of almost X? percent. This growth will be fueled by the movement to cloud-based services; the demand for single, federated sign-on to Software as a Service (SaaS) apps, the continuing growth of the threat landscape; open standards approaches; and new, innovative methods for stronger authentication.
•RSA remains the largest vendor in the market, with about one-fifth of the market revenue. This is down from 2010 when RSA had approximately one-quarter of the market revenue. The decline is market revenue is less about RSA’s performance and more about a growing market for new authentication methods.
1. According to the 2012 Verizon Breach Investigation Report, weak or stolen login credentials were a factor in over X? percent of the breaches analyzed.
2. The authentication form factor used should be determined by types of authentication needs.
3. There are a number of emerging alternatives to hardware OTP. Security professionals should apply an open mind.
4. Authentication methods should be viewed as a method to manage risk. Companies need multiple methods of authentication to properly match the strength/convenience of the authentication method to the level of risk to be managed.
Introduction to the Research
Purpose of the Research
•This report provides an analysis of the market for strong authentication:
oFour years of historical market sizing and five years of market forecast
oMarket shares for the market participants
oMarket description and market trends
oDrivers and restraints
oIndividual company profiles of the market participants
Key Questions This Study Will Answer
What is strong authentication and why is it needed?
What are the predominant methods of strong authentication?
How will the structure of the market change with time?
What is the future of the hardware token?
What is the market size for strong authentication from 2010 to 2018?
What is the strong authentication revenue for the leading vendors by hardware token, software token, USB key, and biometrics?
Get Industry Insights. Simply.
Talk to Veronica
+1 718 514 2762
Global Exploration and Production Software Market: Overview The report provides analysis of the Exploration & Production (E&P) Software market for the period 2014–2024, wherein the years from 2016 to ...
Use this report to: - Gain information about internet of things (IOT) and its impact on the prospects of antennas. - Learn about various concepts and terminologies related to antennas. - Gain an insight ...
Use this report to: - Understand the underlying operating system and the way it shapes the global mobile applications market. - Learn about the various software development kits offered by manufacturers ...