Welcome!

Web 2.0 Authors: Raju Chekuri, Elizabeth White, Hovhannes Avoyan, Kevin Benedict, Ian Khan

News Feed Item

Global Multi-Factor Authentication Trends Industry

NEW YORK, March 20, 2014 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

Global Multi-Factor Authentication Trends Industry
http://www.reportlinker.com/p02052103/Global-Multi-Factor-Authentication-Trends-Industry.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Security_Systems

Multi-Factor Authentication, also referred to as strong authentication, is a layered security system, which is used for the protection of online financial information of customers. This system adds two or more security layers to secure the user from external threats.

The report analyzes and presents an overview of Multi-Factor Authentication market worldwide. The report also provides global market estimates and projections for Multi-Factor Authentication in US dollars for years 2012 through 2017. Supported with 1 market data table the report provides a review of market trends, growth drivers, and various types of authentication. Furthermore, the report covers about the emergence of biometric technology as a main stream technique for providing secure authentication. The report also highlights on various strategic industry activities of major companies witnessed by the industry over the last few years. In addition, 94 companies operating in the Multi-Factor Authentication arena worldwide including AuthenWare® Corporation, CA Technologies, CertiVox, Easy Solutions, Equifax, Gemalto NV, Intel Corporation, LastPass, Microsoft Corporation, OneLogin, PhoneFactor Inc., Science Applications International Corporation and others are profiled.

1. MULTI-FACTOR AUTHENTICATION - OVERCOMING SECURITY THREATS 1
Multi-Factor Authentication - An Introduction 1
Types of Authentication 1
Password Authentication 1
Two-Factor Authentication 1
Three-Factor Authentication 2
TIC Authentication for Secure Financial Transactions 2
SMS Authentication 3
Adaptive Authentication 3

2. MARKET TRENDS 4
Smart Cards and Biometrics: A Boon for Security Applications 4
Biometrics to Become Authentication Benchmark 4
Global Market for Multi-Factor Authentication Witnesses Growth 4
Table 1: Global Multi-Factor Authentication Market (2012-
2017) in US$ Million 5
Rise of Smart Grid Cyber Security in China 5
Growth Drivers in Mobile Phone Biometric Security Market 6

3. RECENT INDUSTRY ACTIVITY 7
Easy Solutions Enters into Partnership with CRM Online 7
Apple to Acquire AuthenTec 7
Centers for Medicare & Medicaid Services Selects Two-Factor
Credentialing Solution of Experian and Symantec 7
CertiVox Enters into Partnership Agreement with Parallels® 7
Covisint Enters into Partnership with Duo Security 8
Intel Inks Agreement with AhnLab 8
Microsoft Takes Over PhoneFactor 8
OneLogin Selects RSA SecurID© Technology of RSA 8
Palo Alto Networks™ and Swivel Secure Enter into Partnership 9
Science Applications International Obtains Contract from CMS 9
AuthenWare® and 2Keys Security Solutions Ink Reseller Agreement 9
BlueStar Energy Solutions Deploys DigitalPersona®Pro of
DigitalPersona 10
Elephant Talk Communications Inks Agreement with Visa Europe 10

LastPass Enters into Agreement with ID Watchdog 10
PhoneFactor and Accelera Solutions Enter into Partnership 11
RMS Managed ICT Security Inks Agreement with ValidSoft to
Offer VALid® in UK 11
SPAR Group Inks Agreement with Krognos Integrated Marketing
Services 11
CA Technologies to Takeover Arcot Systems 11
Equifax Takes Over Anakam 12
Gemalto Takes Over Valimo Wireless 12
Gemalto Takes Over Todos 12
PhoneFactor Announces Partnership with Fundtech 12
PhoneFactor Enters into Partnership with Fiserv 12
Visa Europe and ValidSoft Ink Agreement 13
West Selects Anakam Identity Suite® of Anakam for West at Home
Service 13

4. PRODUCT/SERVICE LAUNCHES 14
Authen2cate Launches Single Sign-on and Multi-factor
Authentication 14
Bluepoint Solutions Unveils QwikDeposit Pro 14
ESET Introduces New ESET Secure Authentication Product 14
Route1 Launches MobiKEY Technology for Apple iPad 14
SecureKey Technologies Rolls Out Briidge.net™ Identity and
Authentication Platform 15
Authentify Launches 2CHK™ Out-of-Band Authentication Service 15
Lexis Nexis Risk Solutions Rolls Out New Multi-factor
Authentication Solutions 16
PhoneFactor Rolls Out PhoneFactor Authentication App for Smart
Devices 16
SMS PASSCODE Launches SMS PASSCODE® Version 6.1 16
StrikeForce Technologies and TradeHarbor Develop Three-Factor
Voice Verification Solution 17
Equifax Introduces Anakam 5.0 Two Factor Authentication Solution 17
Facebook Introduces Two-Factor Authentication Feature 17
StillSecure Introduces Managed Multi-Factor Authentication
Service 17
Authasas® Rolls Out Authasas Advanced Authentication for
Novell® SecureLogin 18

5. MARKET PARTICIPANTS 19
3M Company (USA) 19
AhnLab (Korea) 19
Amazon Web Services, Inc. (USA) 19
Apple, Inc. (USA) 19
Authasas (The Netherlands) 19
Authen2cate (USA) 20
Authentify, Inc. (USA) 20
AuthenWare® Corporation (USA) 20
Authy (USA) 20
Bluepoint Solutions (USA) 20
CA Technologies (USA) 20
Celestix Networks, Inc. (USA) 21
Centrify Corporation (USA) 21
CertiVox (UK) 21
Cloudseal (UK) 21
Collective Software LLC (USA) 22

Confident Technologies, Inc. (USA) 22
Cross Match Technologies, Inc. (USA) 22
CubeIQ Ltd. (Greece) 22
DataArt (USA) 22
DDS, Inc. (Japan) 22
Deepnet Security (UK) 23
Delfigo Security (USA) 23
Dell, Inc. - Quest Software (USA) 23
DigitalPersona, Inc. (USA) 23
Diverse Computing, Inc. (USA) 23
Dome9 Security Ltd. (Israel) 23
Duo Security, Inc. (USA) 23
DynaPass, Inc. (USA) 24
Easy Solutions (USA) 24
Elephant Talk Communications Corporation (The Netherlands) 24
Encap AS (Norway) 24
Entrust, Inc. (USA) 24
Equifax (USA) 25
ESET Spol. Sro (Slovak Republic) 25
Experian (USA) 25
Ezmcom, Inc. (USA) 25

First Information Security (UAE) 26
Fiserv, Inc. (USA) 26
Fortinet, Inc. (USA) 26
Gemalto NV (The Netherlands) 26
Gemalto eBanking (The Netherlands) 27
Green Armor Solutions, Inc. (USA) 27
HID Global (USA) 27
ID Control BV (The Netherlands) 27
ID Watchdog, Inc. (USA) 27
Identive Group, Inc. (USA) 28
Imprivata, Inc. (USA) 28
Intel Corporation (USA) 28
KnowledgeTree (USA) 28
LastPass (USA) 28
LexisNexis (USA) 28
Lumidigm, Inc. (USA) 29
McAfee, Inc. (USA) 29
Microsoft Corporation (USA) 29
Morpho (France) 29

NEC Corporation (Japan) 29
Okta, Inc. (USA) 30
OneLogin (USA) 30
Passfaces Corporation (USA) 30
PhoneFactor, Inc. (USA) 30
PistolStar, Inc. (USA) 30
Rapidsoft Systems, Inc. (USA) 31
RCG Holdings Ltd. (Hong Kong) 31
Route1, Inc. (Canada) 31
RSA Security, Inc. (USA) 31
SafeNet, Inc. (USA) 31
Safetic Ireland Ltd. (Ireland) 31
Science Applications International Corporation (SAIC) (USA) 32
SecuGen Corporation (USA) 32
Secure IQ (USA) 32
SecureAuth Corporation (USA) 32
SecureKey Technologies, Inc. (Canada) 32
SecurEnvoy Ltd. (UK) 33
SecurIT Bvba (Belgium) 33
SMS Passcode A/S (Denmark) 33
SolidPass (USA) 33
SSH Communications Security (Finland) 33
StillSecure (USA) 33
StrikeForce Technologies, Inc. (USA) 34
Suprema, Inc. (Korea) 34
Swivel Secure Ltd. (UK) 34
SyferLock Technology Corporation (USA) 34
Symantec Corporation (USA) 34

Technology Nexus AB (Sweden) 35
Thales e-Security, Inc. (USA) 35
TradeHarbor, Inc. (USA) 35
Trustwave (USA) 35
Twilio, Inc. (USA) 36
ValidSoft (UK) 36
VASCO Data Security International, Inc. (USA) 36
Watchdata Technologies Pte., Ltd. (Singapore) 36
WiKID Systems, Inc. (USA) 36
Yubico AB (Sweden) 36

6. APPENDIX 37

To order this report: Global Multi-Factor Authentication Trends Industry
http://www.reportlinker.com/p02052103/Global-Multi-Factor-Authentication-Trends-Industry.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Security_Systems

__________________________
Contact Clare: [email protected]
US: (339)-368-6001
Intl: +1 339-368-6001

SOURCE Reportlinker

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Ayla Networks, whose agile Internet of Things (IoT) platform makes it easy for manufacturers to deliver secure, connected products, today announced it has been included in the list of "Cool Vendors" in the Internet of Things report by Gartner, Inc. “Gartner knows how important it is that manufacturers of all kinds of products have the right IoT solution to help turn their products into connected ‘things,’” said David Friedman, CEO and co-founder of Ayla Networks. “The market for Ayla’s IoT platform has accelerated dramatically this year compared to last year. Today’s largest manufacturers ar...
We heard for many years how developing nations would be able to develop mobile-phone networks quickly, perhaps even leapfrog developed nations, because their lack of traditional, wired networks would not inhibit them from deploying the new technology. Now there is talk of history repeating itself with the Industrial Internet--a key aspect of the emerging Internet of Things. For example, Guo Ping, Deputy Chairman of the Board of Chinese electronics giant Huawei, said in a recent report from the World Economic Forum, "The Industrial Internet will afford emerging markets a unique opportunity ...
SYS-CON Events announced today that B2Cloud, a provider of enterprise resource planning software, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. B2cloud develops the software you need. They have the ideal tools to help you work with your clients. B2Cloud’s main solutions include AGIS – ERP, CLOHC, AGIS – Invoice, and IZUM
The Internet of Things Maturity Model (IoTMM) is a qualitative method to gauge the growth and increasing impact of IoT capabilities in an IT environment from both a business and technology perspective. In his session at @ThingsExpo, Tony Shan will first scan the IoT landscape and investigate the major challenges and barriers. The key areas of consideration are identified to get started with IoT journey. He will then pinpoint the need of a tool for effective IoT adoption and implementation, which leads to IoTMM in which five maturity levels are defined: Advanced, Dynamic, Optimized, Primitive,...
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY., and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides private all-in-one social intranets allowing workers to securely collaborate from anywhere in the world and from any device. Social, mobile, and easy to use. MangoApps has been named a "Market Leader" by Ovum Research and a "Cool Vendor" by Gartner...
The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on Twitter at @MicroservicesE
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch of Docker's initial release in March of 2013, interest was revved up several notches. Then late last...
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immediate and actionable interpretation of events as they happen. Another aspect concerns how to deliver ...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
So I guess we’ve officially entered a new era of lean and mean. I say this with the announcement of Ubuntu Snappy Core, “designed for lightweight cloud container hosts running Docker and for smart devices,” according to Canonical. “Snappy Ubuntu Core is the smallest Ubuntu available, designed for security and efficiency in devices or on the cloud.” This first version of Snappy Ubuntu Core features secure app containment and Docker 1.6 (1.5 in main release), is available on public clouds, and for ARM and x86 devices on several IoT boards. It’s a Trend! This announcement comes just as...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons. In the IoT vision, every new "thing" - sensor, actuator, data source, data con...
The WebRTC Summit 2015 New York, to be held June 9-11, 2015, at the Javits Center in New York, NY, announces that its Call for Papers is open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 16th International Cloud Expo, @ThingsExpo, Big Data Expo, and DevOps Summit.
SYS-CON Events announced today the IoT Bootcamp – Jumpstart Your IoT Strategy, being held June 9–10, 2015, in conjunction with 16th Cloud Expo and Internet of @ThingsExpo at the Javits Center in New York City. This is your chance to jumpstart your IoT strategy. Combined with real-world scenarios and use cases, the IoT Bootcamp is not just based on presentations but includes hands-on demos and walkthroughs. We will introduce you to a variety of Do-It-Yourself IoT platforms including Arduino, Raspberry Pi, BeagleBone, Spark and Intel Edison. You will also get an overview of cloud technologies s...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover how hardware commoditization, the ubiquitous nature of connectivity, and the emergence of Big Data a...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
In his session at WebRTC Summit, Peter Dunkley, Technical Director at Acision, will look at creating interactive communications via the web by adding messaging, file transfer, and group communication (group chat and audio/video conferencing) into the web experience. He will also discuss potential applications of this technology in areas including B2B, B2C, P2P, and gaming. Peter Dunkley is Technical Director at Acision. He graduated from The University of Edinburgh in 2000 with a BSc (Hons) in Computer Science. After graduation Peter worked on a PSTN switch developing signalling stacks for SS...
It's time to put the "Thing" back in IoT. Whether it’s drones, robots, self-driving cars, ... There are multiple incredible examples of the power of IoT nowadays that are shadowed by announcements of yet another twist on statistics, databases, .... Sorry, I meant, Big Data(TM), tiered storage(TM), complex systems(TM), smart nations(TM), .... In his session at WebRTC Summit, Dr Alex Gouaillard, CTO and Co-Founder of Temasys, will discuss the concrete, cool, examples of IoT already happening today, and how mixing all those different sources of visual and audio input can make your life happier ...
What exactly is a cognitive application? In her session at 16th Cloud Expo, Ashley Hathaway, Product Manager at IBM Watson, will look at the services being offered by the IBM Watson Developer Cloud and what that means for developers and Big Data. She'll explore how IBM Watson and its partnerships will continue to grow and help define what it means to be a cognitive service, as well as take a look at the offerings on Bluemix. She will also check out how Watson and the Alchemy API team up to offer disruptive APIs to developers.
SYS-CON Events announced today that Site24x7, the cloud infrastructure monitoring service, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Site24x7 is a cloud infrastructure monitoring service that helps monitor the uptime and performance of websites, online applications, servers, mobile websites and custom APIs. The monitoring is done from 50+ locations across the world and from various wireless carriers, thus providing a global perspective of the end-user experience. Site24x7 supports monitoring H...