Welcome!

iPhone Authors: Elizabeth White, Christophe Primault, Carmen Gonzalez, Pat Romanski, Liz McMillan

News Feed Item

Multi-Factor Authentication Market - By Model/Type [Two, Three, Four & Five-Factor], Application [Banking & Finance, Healthcare, Government, Defense, Travel & Immigration, Consumer Electronics & Commercial Security] & Geography - Forecasts (2012 - 2017)

NEW YORK, Dec. 31, 2012 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

Multi-Factor Authentication Market - By Model/Type [Two, Three, Four & Five-Factor], Application [Banking & Finance, Healthcare, Government, Defense, Travel & Immigration, Consumer Electronics & Commercial Security] & Geography – Forecasts (2012 – 2017)

http://www.reportlinker.com/p01054401/Multi-Factor-Authentication-Market---By-Model/Type-[Two-Three-Four--Five-Factor]-Application-[Banking--Finance-Healthcare-Government-Defense-Travel--Immigration-Consumer-Electronics--Commercial-Security]--Geography-–-Forecasts-2012-–-2017.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Security_Systems

The global multi-factor authentication (MFA) market which includes different types of authentication and applications is expected to reach $5.45 billion by 2017 at an estimated CAGR of 17.3% from 2012 to 2017. Two-factor authentication is most widely used MFA model in the world with smartcard with PIN and one time password (OTP) are the most popular technique. Biometric based MFA models are growing at a fast rate. North America and Europe covers most of the market, whereas APAC has the fastest growing region.

Some of the key developments in the authentication industry include Microsoft (U.S.) buying PhoneFactor (U.S.) in October 2012. In July 2012, Apple Inc. (U.S.) bought AuthenTec (U.S.). L1 Identity, a biometric technology company was bought by Sagem Morpho (France). Several other acquisitions, mergers, new product launch, agreements etc. have happened and are discussed in the report.

The report estimates the multi factor authentication market, forecasts the size of MFA technologies by models, by applications, and by geography from 2012 to 2017. It talks about the latest events in the market under winning imperatives and burning issues. We further segment the models by two-factor authentication, three-factor authentication, four-factor authentication, and five-factor authentication. These models are used in different industries according to the security requirements. Two-factor and three-factor authentication models are further segmented into different types of models.

This report segregates the overall multi-factor authentication market into various application areas such as government, defence, banking and finance, travel and immigration, healthcare, consumer electronics, commercial security, and others. Increasing security concerns, use of MFA in banking & finance, use of MFA via smartphones, increasing cybercrime, etc. give rise to MFA market.

This report deals with all the driving factors, restraints, and opportunities with respect to the MFA market, which are helpful in identifying trends and key success factors for the industry. It also profiles companies active in the field of MFA technology. The report provides the competitive landscape of the players, which covers key growth strategies followed by all the major players. It also highlights the winning imperatives and burning issues pertaining to the MFA industry. It does analyze the MFA technology market with the help of Porter's five-force model.

Scope of the report

This research report categorizes the global MFA technology, based on types of authentication and applications market; it also covers the forecasted revenue from 2012 to 2017 and future applications of MFA market. It also shows the various activities that are being conducted by different institutes and universities. It describes the deployments of MFA technology in various regions. The report describes the applications mapping the MFA market with respect to the growth potential and adoption by the users.

On the basis of types of authentication (Model)

The global MFA market is categorized into various models such two-factor, three-factor, four-factor, and five-factor authentication. Two-factor authentication is further segmented into smartcard with PIN, smartcard with biometric technology, PIN with biometric technology and two biometric technologies. Similarly, a three-factor authentication model is segmented into smartcard with PIN and biometric technology, smartcard with two biometric technologies, PIN with two biometric technologies, and three biometric technologies.

On the basis of application areas

Application areas of biometric technology have been categorized into government, travel and immigration, defense, banking and finance, healthcare, consumer electronics and commercial security.

On the basis of geography

Geographical analysis covers North America, Europe, Asia-Pacific, and ROW. In this report, North America is further segregated by countries such as U.S., Canada, and Mexico. Europe is further segregated into Germany, U.K., France, Italy, and others. APAC is segregated into Australia, China, Japan, South Korea, and India. ROW is segregated into Africa and Middle East.

table of contents

1 Introduction 21

1.1 Key Take-Aways 21

1.2 Report Description 21

1.3 MARKETS COVERED 22

1.4 STAKEHOLDERS 23

1.5 RESEARCH METHODOLOGY 24

1.5.1 Market size 27

1.5.2 KEY DATA POINTS TAKEN FROM PRIMARY SOURCES 28

1.5.3 KEY DATA POINTS TAKEN FROM secondary SOURCES 28

1.5.4 ASSUMPTIONS MADE FOR THIS REPORT 29

1.5.5 LIST OF COMPANIES COVERED DURING Study 29

2 Executive Summary 31

3 Market Overview 37

3.1 Introduction 38

3.2 Market definition 39

3.3 Advantages of multi-factor authentication 41

3.4 Technologies, Standards & Trends 41

3.5 MARKET DYNAMICS 42

3.5.1 DRIVERS 42

3.5.1.1 Legislative compliance 43

3.5.1.2 Use of multi model authentication in banking & finance 44

3.5.1.3 Increasing security concerns for network, PC and internet security 45

3.5.1.4 Smartphone-based mobile device with MFA technology 47

3.5.1.5 Multi factor authentication is the next step of payment system 48

3.5.2 Restraints 49

3.5.2.1 High initial investment and complex maintenance 50

3.5.2.2 Low acceptance in several countries due to cultural/religious reasons 50

3.5.3 OPPORTUNITIES 51

3.5.3.1 Introduction of MFA in gaming 51

3.5.4 Burning issue 52

3.5.4.1 Administration of multi-factor authentication 52

3.5.5 WINNING IMPERATIVES 52

3.5.5.1 Ease of use 52

3.6 Porter's five forces model 53

3.6.1 Intensity of rivalry 54

3.6.2 Bargaining Power of Suppliers 54

3.6.3 Bargaining Power of Customers 54

3.6.4 Threat of New entrants 54

3.6.5 Threat of Substitutes 55

3.7 Application Analysis of multi-factor authentication 56

3.8 Life cycle of multi-factor authentication market by model 57

4 Multi-factor authentication market, by Model 59

4.1 Introduction 60

4.2 Multi-factor with two-factor authentication 61

4.2.1 Smart card with Pin 66

4.2.2 Smart card with Biometric technology 67

4.2.3 Biometric technology with Pin 68

4.2.4 Two-factor biometric technology 68

4.2.5 one time password with pin 68

4.3 Multi-factor with three-factor authentication 69

4.3.1 Smart card with Pin and Biometric technology 75

4.3.2 Smart card with two-factor biometric technologies 75

4.3.3 Pin with two-factor biometric technologies 76

4.3.4 Three-factor Biometric technology 76

4.4 Multi-factor with four-factor authentication 77

4.5 Multi-factor with five-factor authentication 82

5 Multi-factor authentication market, by Applications 88

5.1 introduction 89

5.2 Travel & immigration and transportation 91

5.3 Government 96

5.4 Defense 102

5.5 Banking & finance 107

5.6 Commercial security 115

5.7 Consumer electronics 120

5.8 Healthcare 125

5.9 Others 131

6 Multi-factor authentication market, by Geography 132

6.1 Introduction 133

6.2 North America 133

6.2.1 U.S. 137

6.2.2 Canada 139

6.2.3 Mexico 141

6.3 Europe 144

6.3.1 Germany 148

6.3.2 U.K. 151

6.3.3 France 154

6.3.4 Italy 157

6.4 APAC 160

6.4.1 Australia 164

6.4.2 China 166

6.4.3 Japan 168

6.4.4 South Korea 171

6.4.5 India 173

6.5 ROW 176

6.5.1 Middle East 179

6.5.2 Africa 181

7 COMPETITIVE LANDSCAPE 184

7.1 Leading Multi-factor authentication companies 184

7.2 key growth strategies 186

8 Company Profiles 201

(Overview, Financials, Products & Services, Strategy, and Developments)*

8.1 3M 201

8.2 ActiveIdentity inc. 204

8.3 Confident Technologies 207

8.4 CROSS MATCH TECHNOLOGIES 209

8.5 DEEPNET SECURITY Ltd. 212

8.6 Entrust, inc. 215

8.7 EZMCOM INC. 218

8.8 Fujitsu 221

8.9 Gemalto 224

8.10 Identive Group 228

8.11 Lumidigm 232

8.12 NEC CORP 235

8.13 Passfaces 239

8.14 RCG Holding 241

8.15 RSA Security 244

8.16 sAFETIC 247

8.17 Sagem Morpho 249

8.18 Secugen 254

8.19 SECURENVOY LTD. 257

8.20 SMS PASSCODE A/S 259

8.21 SUPREMA, INC. 262

8.22 Technology Nexus AB 266

8.23 WATCHDATA TECHNOLOGIES 270

8.24 ZK Software 273

*Details on financials, product & services, strategy, and developments might not be captured in case of unlisted companies.

List of TableS

UU

TABLE 1 Global multi-factor authentication market revenue,

by models, 2012 – 2017 ($MILLION) 32

TABLE 2 GLOBAL MULTI-FACTOR AUTHENTICATION MARKET revenue,

BY Applications, 2012 – 2017 ($MILLION) 34

TABLE 3 GLOBAL MULTI-FACTOR AUTHENTICATION MARKET revenue,

BY Geography, 2012 – 2017 ($MILLION) 35

TABLE 4 GLOBAL multi-factor authentication market revenue,

by models, 2012 – 2017 ($million) 60

TABLE 5 Global two-factor Authentication Market revenue, by types, 2012 – 2017 ($million) 61

TABLE 6 TWO-FACTOR AUTHENTICATION MARKET revenue, BY GEOGRAPHY, 2012 – 2017 ($MILLION) 62

TABLE 7 NORTH AMERICA: two-factor Authentication Market REVENUE, BY COUNTRY, 2012 – 2017 ($MILLION) 63

TABLE 8 Europe: two-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 64

TABLE 9 APAC: two-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 65

TABLE 10 ROW: two-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 66

TABLE 11 Global three-factor Authentication Market revenue,

by types, 2012 – 2017 ($million) 70

TABLE 12 three-FACTOR AUTHENTICATION MARKET revenue, BY GEOGRAPHY, 2012 – 2017 ($MILLION) 71

TABLE 13 NORTH AMERICA: three-factor Authentication Market REVENUE, BY COUNTRY, 2012 – 2017 ($MILLION) 72

TABLE 14 Europe: three-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 73

TABLE 15 APAC: three-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 74

TABLE 16 ROW: three-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 75

TABLE 17 four-factor Authentication Market revenue, by Geography, 2012 – 2017 ($million) 78

TABLE 18 NORTH AMERICA: four-factor Authentication Market REVENUE, BY COUNTRY, 2012 – 2017 ($MILLION) 79

TABLE 19 Europe: four-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 80

TABLE 20 APAC: four-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 81

TABLE 21 ROW: four-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 82

TABLE 22 five-factor Authentication Market revenue, by Geography, 2012 – 2017 ($million) 83

TABLE 23 NORTH AMERICA: five-factor Authentication Market REVENUE, BY COUNTRY, 2012 – 2017 ($MILLION) 84

TABLE 24 Europe: five-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 85

TABLE 25 APAC: five-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 86

TABLE 26 ROW: five-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 87

TABLE 27 multi-factor authentication MARKET REVENUE,

by APPLICATIONs, 2012 – 2017 ($MILLION) 90

TABLE 28 multi-factor authentication MARKET REVENUE, for Travel & immigration & transportation APPLICATION, by geography, 2012 – 2017 ($MILLION) 91

TABLE 29 north america: multi-factor Authentication Market REVENUE, for Travel & immigration and transportation APPLICATION,

BY COUNTRY, 2012 – 2017 ($MILLION) 92

TABLE 30 Europe: multi-factor Authentication Market REVENUE,

for Travel & immigration and transportation APPLICATION,

BY COUNTRY, 2012 – 2017 ($MILLION) 93

TABLE 31 APAC: multi-factor Authentication Market REVENUE,

for Travel & immigration and transportation APPLICATION,

BY COUNTRY, 2012 – 2017 ($MILLION) 94

TABLE 32 ROW: multi-factor Authentication Market REVENUE,

for Travel & immigration and transportation APPLICATION,

BY COUNTRY, 2012 – 2017 ($MILLION) 95

TABLE 33 multi-factor authentication MARKET REVENUE,

for government APPLICATION, by geography,

2012 – 2017 ($MILLION) 98

TABLE 34 north america: multi-factor Authentication Market REVENUE, for government APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 99

TABLE 35 Europe: multi-factor Authentication Market REVENUE,

for government APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 100

TABLE 36 APAC: multi-factor Authentication Market REVENUE,

for government APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 101

TABLE 37 ROW: multi-factor Authentication Market REVENUE,

for government APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 102

TABLE 38 multi-factor authentication MARKET REVENUE, for defense APPLICATION, by geography, 2012 – 2017 ($MILLION) 103

TABLE 39 north america: multi-factor Authentication Market REVENUE, for defense APPLICATION, BY COUNTRY, 2012 – 2017 ($MILLION) 104

TABLE 40 Europe: multi-factor Authentication Market REVENUE,

for defense APPLICATION, BY COUNTRY, 2012 – 2017 ($MILLION) 105

TABLE 41 APAC: multi-factor Authentication Market REVENUE,

for defense APPLICATION, BY COUNTRY, 2012 – 2017 ($MILLION) 106

TABLE 42 ROW: multi-factor Authentication Market REVENUE,

for government APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 107

TABLE 43 multi-factor authentication MARKET REVENUE, for banking & finance APPLICATION, by geography, 2012 – 2017 ($MILLION) 111

TABLE 44 north america: multi-factor Authentication Market REVENUE, for banking & finance APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 112

TABLE 45 Europe: multi-factor Authentication Market REVENUE,

for banking & finance APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 113

TABLE 46 APAC: multi-factor Authentication Market REVENUE,

for banking & finance APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 114

TABLE 47 ROW: multi-factor Authentication Market REVENUE,

for banking & finance APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 115

TABLE 48 multi-factor authentication MARKET REVENUE,

for Commercial Security APPLICATION, by geography,

2012 – 2017 ($MILLION) 116

TABLE 49 north america: multi-factor Authentication Market REVENUE, for Commercial Security APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 117

TABLE 50 Europe: multi-factor Authentication Market REVENUE,

for Commercial Security APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 118

TABLE 51 APAC: multi-factor Authentication Market REVENUE,

for Commercial Security APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 119

TABLE 52 ROW: multi-factor Authentication Market REVENUE,

for Commercial Security APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 120

TABLE 53 multi-factor authentication MARKET REVENUE, for consumer electronics APPLICATION, by geography, 2012 – 2017 ($MILLION) 121

TABLE 54 north america: multi-factor Authentication Market REVENUE, for consumer electronics APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 122

TABLE 55 Europe: multi-factor Authentication Market REVENUE,

for consumer electronics APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 123

TABLE 56 APAC: multi-factor Authentication Market REVENUE,

for consumer electronics APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 124

TABLE 57 ROW: multi-factor Authentication Market REVENUE,

for consumer electronics APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 125

TABLE 58 multi-factor authentication MARKET REVENUE, for healthcare APPLICATION, by geography, 2012 – 2017 ($MILLION) 127

TABLE 59 north america: multi-factor Authentication Market REVENUE, for healthcare APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 128

TABLE 60 Europe: multi-factor Authentication Market REVENUE,

for healthcare APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 129

TABLE 61 APAC: multi-factor Authentication Market REVENUE,

for healthcare APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 130

TABLE 62 ROW: multi-factor Authentication Market REVENUE,

for healthcare APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 131

TABLE 63 NORTH AMERICA: multi-factor authentication MARKET REVENUE, BY COUNTRY, 2012 – 2017 ($million) 134

TABLE 64 NORTH AMERICA: multi-factor authentication MARKET REVENUE, BY type, 2012 – 2017 ($million) 135

TABLE 65 NORTH AMERICA: multi-factor authentication MARKET REVENUE, BY applications, 2012 – 2017 ($million) 136

TABLE 66 u.s.: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 137

TABLE 67 u.s.: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 138

TABLE 68 Canada: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 140

TABLE 69 canada: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 141

TABLE 70 mexico: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 142

TABLE 71 mexico: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 143

TABLE 72 europe: multi-factor authentication MARKET REVENUE,

BY COUNTRY, 2012 – 2017 ($million) 146

TABLE 73 europe: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 147

TABLE 74 europe: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 148

TABLE 75 germany: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 150

TABLE 76 germany: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 151

TABLE 77 U.k.: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 152

TABLE 78 u.k.: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 153

TABLE 79 france: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 155

TABLE 80 france: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 156

TABLE 81 italy: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 158

TABLE 82 italy: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 159

TABLE 83 APAC: multi-factor authentication MARKET REVENUE,

BY COUNTRY, 2012 – 2017 ($million) 161

TABLE 84 APAC: multi-factor authentication MARKET REVENUE, BY types, 2012– 2017 ($million) 162

TABLE 85 apac: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 163

TABLE 86 australia: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 164

TABLE 87 australia: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 165

TABLE 88 China: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 166

TABLE 89 China: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 167

TABLE 90 japan: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 169

TABLE 91 japan: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 170

TABLE 92 south korea: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 171

TABLE 93 south korea: multi-factor authentication MARKET REVENUE, BY applications, 2012 – 2017 ($million) 172

TABLE 94 india: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 174

TABLE 95 india: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 175

TABLE 96 row: multi-factor authentication MARKET REVENUE,

BY COUNTRY, 2012 – 2017 ($million) 176

TABLE 97 row: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 177

TABLE 98 row: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 178

TABLE 99 middle east: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 180

TABLE 100 middle east: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 181

TABLE 101 africa: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 182

TABLE 102 africa: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 183

TABLE 103 Ranking of non-biometric based multi-factor authentication provider 184

TABLE 104 biometric based multi-factor authentication provider & their services offered 185

TABLE 105 New product launch/development 187

TABLE 106 Mergers & Acquisitions 192

TABLE 107 Partnerships/agreements/strategic alliance/ collaboration 194

TABLE 108 Contract/deployment 198

TABLE 109 3M: Overall revenue, 2010 – 2011 ($billion) 202

TABLE 110 Product specifications 219

TABLE 111 FUJITSU: OVERALL REVENUE, 2011 – 2012 ($million) 222

TABLE 112 Identive Group: Company financials 2010 – 2011 ($million) 230

TABLE 113 NEC: Overall revenue, 2011 – 2012 ($Billion) 237

TABLE 114 RCG: Overall revenue, 2010 – 2011 ($million) 242

TABLE 115 Rsa'S Product description 245

TABLE 116 Sagem Morpho: Overall Revenue, 2010 – 2011 ($Million) 251

TABLE 117 Sagem Morpho: Security Revenue, By sectors,

2010 – 2011 ($Million) 251

TABLE 118 Products offered by SecurEnvoy 258

List of FIGURES

FIGURE 1 GLOBAL MULTI-FACTOR AUTHENTICATION MARKET segmentation 23

FIGURE 2 Steps of Research 25

FIGURE 3 Market Crackdown 26

FIGURE 4 Multi-Factor market breakdown strategy 27

FIGURE 5 Major categories of authentication factors 39

FIGURE 6 Sample pictures of USB biometric scanners 40

FIGURE 7 Multi-factor authentication by model 42

FIGURE 8 IMPACT ANALYSIS OF drivers 43

FIGURE 9 Growth of smartphones & tablets market (million units) 48

FIGURE 10 IMPACT ANALYSIS OF RESTRAINTS 49

FIGURE 11 Porter's five force model 53

FIGURE 12 Target Applications Of Multi-factor authentication Market 56

FIGURE 13 Maturity level of different model of multi-factor authentication 58

FIGURE 14 RISK OF EXPOSURE V/S TRANSACTION FREEQUENCY IN BANKING & FINANCE 109

FIGURE 15 Security offered by different methods of authentication. 110

FIGURE 16 Key growth strategies 186

FIGURE 17 Actividentity: Product overview 205

FIGURE 18 Actividentity, Inc.: Solutions overview 205

FIGURE 19 Products & services offered by confident technologies 207

FIGURE 20 Cross Match Technologies' key product line 210

FIGURE 21 Deepnet Security Ltd.: Major authentication Products & their types 213

FIGURE 22 Entrust Inc.: Major Sectors catering 216

FIGURE 23 EZMCOM's Operation & product segmentation 218

FIGURE 24 EZMCOM's list of products offered 219

FIGURE 25 Products offered by RSA security (Authentication) 245

FIGURE 26 Product line of safran Morpho 250

FIGURE 27 Sagem Morpho: Revenue breakup, by businesses, 2011 250

FIGURE 28 Products and services offered by Secugen 255

FIGURE 29 Authentication process using SMS Passcode 260

FIGURE 30 Products & services offered by suprema 263

FIGURE 31 Products offered by Technology Nexus AB 267

To order this report:

Security_Systems Industry: Multi-Factor Authentication Market - By Model/Type [Two, Three, Four & Five-Factor], Application [Banking & Finance, Healthcare, Government, Defense, Travel & Immigration, Consumer Electronics & Commercial Security] & Geography – Forecasts (2012 – 2017)

Contact Nicolas: [email protected]
US: (805)-652-2626
Intl: +1 805-652-2626

SOURCE Reportlinker

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.
“In the past year we've seen a lot of stabilization of WebRTC. You can now use it in production with a far greater degree of certainty. A lot of the real developments in the past year have been in things like the data channel, which will enable a whole new type of application," explained Peter Dunkley, Technical Director at Acision, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Windstream, a leading provider of advanced network and cloud communications, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Windstream (Nasdaq: WIN), a FORTUNE 500 and S&P 500 company, is a leading provider of advanced network communications, including cloud computing and managed services, to businesses nationwide. The company also offers broadband, phone and digital TV services to consumers primarily in rural areas.
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud strategy and programs. In this Power Panel at 15th Cloud Expo (http://www.CloudComputingExpo.com), moderated by Ashar Baig, Research Director, Cloud, at Gigaom Research, Nate Gordon, Director of T...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover how hardware commoditization, the ubiquitous nature of connectivity, and the emergence of Big Data a...

ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ --  IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's platform-as-a-service. The new platform enables developers to build ap...

"BSQUARE is in the business of selling software solutions for smart connected devices. It's obvious that IoT has moved from being a technology to being a fundamental part of business, and in the last 18 months people have said let's figure out how to do it and let's put some focus on it, " explained Dave Wagstaff, VP & Chief Architect, at BSQUARE Corporation, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that IDenticard will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. IDenticard™ is the security division of Brady Corp (NYSE: BRC), a $1.5 billion manufacturer of identification products. We have small-company values with the strength and stability of a major corporation. IDenticard offers local sales, support and service to our customers across the United States and Canada. Our partner network encompasses some 300 of the world's leading systems integrators and security s...
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Nigeria has the largest economy in Africa, at more than US$500 billion, and ranks 23rd in the world. A recent re-evaluation of Nigeria's true economic size doubled the previous estimate, and brought it well ahead of South Africa, which is a member (unlike Nigeria) of the G20 club for political as well as economic reasons. Nigeria's economy can be said to be quite diverse from one point of view, but heavily dependent on oil and gas at the same time. Oil and natural gas account for about 15% of Nigera's overall economy, but traditionally represent more than 90% of the country's exports and as...
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session at @ThingsExpo, Ryan Bagnulo, Solution Architect / Software Engineer at SOA Software, focused on desi...
"At our booth we are showing how to provide trust in the Internet of Things. Trust is where everything starts to become secure and trustworthy. Now with the scaling of the Internet of Things it becomes an interesting question – I've heard numbers from 200 billion devices next year up to a trillion in the next 10 to 15 years," explained Johannes Lintzen, Vice President of Sales at Utimaco, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"For over 25 years we have been working with a lot of enterprise customers and we have seen how companies create applications. And now that we have moved to cloud computing, mobile, social and the Internet of Things, we see that the market needs a new way of creating applications," stated Jesse Shiah, CEO, President and Co-Founder of AgilePoint Inc., in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the industry’s first all flash version of HyperConverged Appliances that include both compute and storag...
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile devices as well as laptops and desktops using a visual drag-and-drop application – and eForms-buildi...
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
Code Halos - aka "digital fingerprints" - are the key organizing principle to understand a) how dumb things become smart and b) how to monetize this dynamic. In his session at @ThingsExpo, Robert Brown, AVP, Center for the Future of Work at Cognizant Technology Solutions, outlined research, analysis and recommendations from his recently published book on this phenomena on the way leading edge organizations like GE and Disney are unlocking the Internet of Things opportunity and what steps your organization should be taking to position itself for the next platform of digital competition.
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
As the Internet of Things unfolds, mobile and wearable devices are blurring the line between physical and digital, integrating ever more closely with our interests, our routines, our daily lives. Contextual computing and smart, sensor-equipped spaces bring the potential to walk through a world that recognizes us and responds accordingly. We become continuous transmitters and receivers of data. In his session at @ThingsExpo, Andrew Bolwell, Director of Innovation for HP's Printing and Personal Systems Group, discussed how key attributes of mobile technology – touch input, sensors, social, and ...
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.