Welcome!

News Feed Item

Global Multi-factor Authentication Market - Forecasts to 2016

DUBLIN, Ireland, March 12, 2014 /PRNewswire/ --

Research and Markets (http://www.researchandmarkets.com/research/q9wqlh/global) has announced the addition of the "Global Multi-factor Authentication Market - Forecasts to 2016" report to their offering. 
     (Logo: http://photos.prnewswire.com/prnh/20130307/600769 )


One of the main trends witnessed in the Global Multi-factor Authentication market is increased popularity of phone-based authentication solutions. Advantages such as high scalability, no requirement to carry extra hardware, and easy implementation have increased the adoption of phone-based authentication solutions in comparison with traditional hardware tokens. Furthermore, phone-based authentication can generate an OTP and at the same time it can be used for biometric scanning. 

Thus, the device can be used for three-factor authentication as well. Since virtually everyone carries a mobile phone, there is no need for further investment in hardware tokens. According to the report, one of the main factors driving the market is the increasing number of regulatory requirements. Enterprises are required to comply with these regulations and standards in order to secure their data. In cases of non-compliance, these enterprises may have to pay penalties, which could damage their reputation.

Further, the report states that one of the main challenges is high cost of deployment. The initial cost of hardware tokens is high because it includes the hardware cost, support services, and the deployment cost. The loss or damage of hardware tokens would further increase the overall cost of hardware tokens. 

The report also includes a discussion of the other vendors operating in this market. The other vendors in the market are ActivIdentity Corp., Aladdin, Anakam, Arcot, Authentify, CryptoCard, Deepnet Security, ID Control, PhoneFactor, PortWise, Quest Software, SafeNet, SecureAuth, Secure Envoy, SecurStar, Swivel Secure, Tricerion, and TriCipher.

The study was conducted using an objective combination of primary and secondary information including inputs from key participants in the industry. The report contains a comprehensive market and vendor landscape in addition to a SWOT analysis of the key vendors. 


Key Topics Covered: 

1. Executive Summary

2. List of Abbreviations

3. Introduction

4. Market Research Methodology

5. Scope of the Report

6. Market Landscape

7. Geographical Segmentation

8. Key Leading countries

9. Vendor Landscape

10. Buying Criteria

11. Market Growth Drivers

12. Drivers and their Impact

13. Market Challenges

14. Impact of Drivers and Challenges

15. Market Trends

16. Key Vendor Analysis

17. Other Reports in this Series


Companies Mentioned:

  • ActivIdentity Corp.
  • Aladdin
  • Anakam
  • Arcot
  • Authentify
  • CryptoCard
  • Deepnet Security
  • EMC Corp.
  • Entrust Inc.
  • Gemalto N.V.
  • ID Control
  • PhoneFactor
  • PortWise
  • Quest Software
  • SafeNet
  • SecurStar
  • Secure Envoy
  • SecureAuth
  • Swivel Secure
  • TriCipher.
  • Tricerion
  • VASCO Data Security International Inc.



For more information visit http://www.researchandmarkets.com/research/q9wqlh/global


Media Contact: Laura Wood , +353-1-481-1716, [email protected]


SOURCE Research and Markets

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of D...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal ...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
DevOps and microservices are permeating software engineering teams broadly, whether these teams are in pure software shops but happen to run a business, such Uber and Airbnb, or in companies that rely heavily on software to run more traditional business, such as financial firms or high-end manufacturers. Microservices and DevOps have created software development and therefore business speed and agility benefits, but they have also created problems; specifically, they have created software securi...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
"There is a huge interest in Kubernetes. People are now starting to use Kubernetes and implement it," stated Sebastian Scheele, co-founder of Loodse, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, computer aided design and seismic interpretation are just a few examples of industries facing this challenge. Rather than fighting for incremental gains by pulling these datasets to edge devices, we need to embrace the i...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walked through how Octob...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.