Click here to close now.

Welcome!

.NET Authors: Greg O'Connor, Aria Blog, Pat Romanski, Elizabeth White, Hovhannes Avoyan

News Feed Item

Multi-Factor Authentication Market - By Model/Type [Two, Three, Four & Five-Factor], Application [Banking & Finance, Healthcare, Government, Defense, Travel & Immigration, Consumer Electronics & Commercial Security] & Geography - Forecasts (2012 - 2017)

NEW YORK, Dec. 31, 2012 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

Multi-Factor Authentication Market - By Model/Type [Two, Three, Four & Five-Factor], Application [Banking & Finance, Healthcare, Government, Defense, Travel & Immigration, Consumer Electronics & Commercial Security] & Geography – Forecasts (2012 – 2017)

http://www.reportlinker.com/p01054401/Multi-Factor-Authentication-Market---By-Model/Type-[Two-Three-Four--Five-Factor]-Application-[Banking--Finance-Healthcare-Government-Defense-Travel--Immigration-Consumer-Electronics--Commercial-Security]--Geography-–-Forecasts-2012-–-2017.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Security_Systems

The global multi-factor authentication (MFA) market which includes different types of authentication and applications is expected to reach $5.45 billion by 2017 at an estimated CAGR of 17.3% from 2012 to 2017. Two-factor authentication is most widely used MFA model in the world with smartcard with PIN and one time password (OTP) are the most popular technique. Biometric based MFA models are growing at a fast rate. North America and Europe covers most of the market, whereas APAC has the fastest growing region.

Some of the key developments in the authentication industry include Microsoft (U.S.) buying PhoneFactor (U.S.) in October 2012. In July 2012, Apple Inc. (U.S.) bought AuthenTec (U.S.). L1 Identity, a biometric technology company was bought by Sagem Morpho (France). Several other acquisitions, mergers, new product launch, agreements etc. have happened and are discussed in the report.

The report estimates the multi factor authentication market, forecasts the size of MFA technologies by models, by applications, and by geography from 2012 to 2017. It talks about the latest events in the market under winning imperatives and burning issues. We further segment the models by two-factor authentication, three-factor authentication, four-factor authentication, and five-factor authentication. These models are used in different industries according to the security requirements. Two-factor and three-factor authentication models are further segmented into different types of models.

This report segregates the overall multi-factor authentication market into various application areas such as government, defence, banking and finance, travel and immigration, healthcare, consumer electronics, commercial security, and others. Increasing security concerns, use of MFA in banking & finance, use of MFA via smartphones, increasing cybercrime, etc. give rise to MFA market.

This report deals with all the driving factors, restraints, and opportunities with respect to the MFA market, which are helpful in identifying trends and key success factors for the industry. It also profiles companies active in the field of MFA technology. The report provides the competitive landscape of the players, which covers key growth strategies followed by all the major players. It also highlights the winning imperatives and burning issues pertaining to the MFA industry. It does analyze the MFA technology market with the help of Porter's five-force model.

Scope of the report

This research report categorizes the global MFA technology, based on types of authentication and applications market; it also covers the forecasted revenue from 2012 to 2017 and future applications of MFA market. It also shows the various activities that are being conducted by different institutes and universities. It describes the deployments of MFA technology in various regions. The report describes the applications mapping the MFA market with respect to the growth potential and adoption by the users.

On the basis of types of authentication (Model)

The global MFA market is categorized into various models such two-factor, three-factor, four-factor, and five-factor authentication. Two-factor authentication is further segmented into smartcard with PIN, smartcard with biometric technology, PIN with biometric technology and two biometric technologies. Similarly, a three-factor authentication model is segmented into smartcard with PIN and biometric technology, smartcard with two biometric technologies, PIN with two biometric technologies, and three biometric technologies.

On the basis of application areas

Application areas of biometric technology have been categorized into government, travel and immigration, defense, banking and finance, healthcare, consumer electronics and commercial security.

On the basis of geography

Geographical analysis covers North America, Europe, Asia-Pacific, and ROW. In this report, North America is further segregated by countries such as U.S., Canada, and Mexico. Europe is further segregated into Germany, U.K., France, Italy, and others. APAC is segregated into Australia, China, Japan, South Korea, and India. ROW is segregated into Africa and Middle East.

table of contents

1 Introduction 21

1.1 Key Take-Aways 21

1.2 Report Description 21

1.3 MARKETS COVERED 22

1.4 STAKEHOLDERS 23

1.5 RESEARCH METHODOLOGY 24

1.5.1 Market size 27

1.5.2 KEY DATA POINTS TAKEN FROM PRIMARY SOURCES 28

1.5.3 KEY DATA POINTS TAKEN FROM secondary SOURCES 28

1.5.4 ASSUMPTIONS MADE FOR THIS REPORT 29

1.5.5 LIST OF COMPANIES COVERED DURING Study 29

2 Executive Summary 31

3 Market Overview 37

3.1 Introduction 38

3.2 Market definition 39

3.3 Advantages of multi-factor authentication 41

3.4 Technologies, Standards & Trends 41

3.5 MARKET DYNAMICS 42

3.5.1 DRIVERS 42

3.5.1.1 Legislative compliance 43

3.5.1.2 Use of multi model authentication in banking & finance 44

3.5.1.3 Increasing security concerns for network, PC and internet security 45

3.5.1.4 Smartphone-based mobile device with MFA technology 47

3.5.1.5 Multi factor authentication is the next step of payment system 48

3.5.2 Restraints 49

3.5.2.1 High initial investment and complex maintenance 50

3.5.2.2 Low acceptance in several countries due to cultural/religious reasons 50

3.5.3 OPPORTUNITIES 51

3.5.3.1 Introduction of MFA in gaming 51

3.5.4 Burning issue 52

3.5.4.1 Administration of multi-factor authentication 52

3.5.5 WINNING IMPERATIVES 52

3.5.5.1 Ease of use 52

3.6 Porter's five forces model 53

3.6.1 Intensity of rivalry 54

3.6.2 Bargaining Power of Suppliers 54

3.6.3 Bargaining Power of Customers 54

3.6.4 Threat of New entrants 54

3.6.5 Threat of Substitutes 55

3.7 Application Analysis of multi-factor authentication 56

3.8 Life cycle of multi-factor authentication market by model 57

4 Multi-factor authentication market, by Model 59

4.1 Introduction 60

4.2 Multi-factor with two-factor authentication 61

4.2.1 Smart card with Pin 66

4.2.2 Smart card with Biometric technology 67

4.2.3 Biometric technology with Pin 68

4.2.4 Two-factor biometric technology 68

4.2.5 one time password with pin 68

4.3 Multi-factor with three-factor authentication 69

4.3.1 Smart card with Pin and Biometric technology 75

4.3.2 Smart card with two-factor biometric technologies 75

4.3.3 Pin with two-factor biometric technologies 76

4.3.4 Three-factor Biometric technology 76

4.4 Multi-factor with four-factor authentication 77

4.5 Multi-factor with five-factor authentication 82

5 Multi-factor authentication market, by Applications 88

5.1 introduction 89

5.2 Travel & immigration and transportation 91

5.3 Government 96

5.4 Defense 102

5.5 Banking & finance 107

5.6 Commercial security 115

5.7 Consumer electronics 120

5.8 Healthcare 125

5.9 Others 131

6 Multi-factor authentication market, by Geography 132

6.1 Introduction 133

6.2 North America 133

6.2.1 U.S. 137

6.2.2 Canada 139

6.2.3 Mexico 141

6.3 Europe 144

6.3.1 Germany 148

6.3.2 U.K. 151

6.3.3 France 154

6.3.4 Italy 157

6.4 APAC 160

6.4.1 Australia 164

6.4.2 China 166

6.4.3 Japan 168

6.4.4 South Korea 171

6.4.5 India 173

6.5 ROW 176

6.5.1 Middle East 179

6.5.2 Africa 181

7 COMPETITIVE LANDSCAPE 184

7.1 Leading Multi-factor authentication companies 184

7.2 key growth strategies 186

8 Company Profiles 201

(Overview, Financials, Products & Services, Strategy, and Developments)*

8.1 3M 201

8.2 ActiveIdentity inc. 204

8.3 Confident Technologies 207

8.4 CROSS MATCH TECHNOLOGIES 209

8.5 DEEPNET SECURITY Ltd. 212

8.6 Entrust, inc. 215

8.7 EZMCOM INC. 218

8.8 Fujitsu 221

8.9 Gemalto 224

8.10 Identive Group 228

8.11 Lumidigm 232

8.12 NEC CORP 235

8.13 Passfaces 239

8.14 RCG Holding 241

8.15 RSA Security 244

8.16 sAFETIC 247

8.17 Sagem Morpho 249

8.18 Secugen 254

8.19 SECURENVOY LTD. 257

8.20 SMS PASSCODE A/S 259

8.21 SUPREMA, INC. 262

8.22 Technology Nexus AB 266

8.23 WATCHDATA TECHNOLOGIES 270

8.24 ZK Software 273

*Details on financials, product & services, strategy, and developments might not be captured in case of unlisted companies.

List of TableS

UU

TABLE 1 Global multi-factor authentication market revenue,

by models, 2012 – 2017 ($MILLION) 32

TABLE 2 GLOBAL MULTI-FACTOR AUTHENTICATION MARKET revenue,

BY Applications, 2012 – 2017 ($MILLION) 34

TABLE 3 GLOBAL MULTI-FACTOR AUTHENTICATION MARKET revenue,

BY Geography, 2012 – 2017 ($MILLION) 35

TABLE 4 GLOBAL multi-factor authentication market revenue,

by models, 2012 – 2017 ($million) 60

TABLE 5 Global two-factor Authentication Market revenue, by types, 2012 – 2017 ($million) 61

TABLE 6 TWO-FACTOR AUTHENTICATION MARKET revenue, BY GEOGRAPHY, 2012 – 2017 ($MILLION) 62

TABLE 7 NORTH AMERICA: two-factor Authentication Market REVENUE, BY COUNTRY, 2012 – 2017 ($MILLION) 63

TABLE 8 Europe: two-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 64

TABLE 9 APAC: two-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 65

TABLE 10 ROW: two-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 66

TABLE 11 Global three-factor Authentication Market revenue,

by types, 2012 – 2017 ($million) 70

TABLE 12 three-FACTOR AUTHENTICATION MARKET revenue, BY GEOGRAPHY, 2012 – 2017 ($MILLION) 71

TABLE 13 NORTH AMERICA: three-factor Authentication Market REVENUE, BY COUNTRY, 2012 – 2017 ($MILLION) 72

TABLE 14 Europe: three-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 73

TABLE 15 APAC: three-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 74

TABLE 16 ROW: three-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 75

TABLE 17 four-factor Authentication Market revenue, by Geography, 2012 – 2017 ($million) 78

TABLE 18 NORTH AMERICA: four-factor Authentication Market REVENUE, BY COUNTRY, 2012 – 2017 ($MILLION) 79

TABLE 19 Europe: four-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 80

TABLE 20 APAC: four-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 81

TABLE 21 ROW: four-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 82

TABLE 22 five-factor Authentication Market revenue, by Geography, 2012 – 2017 ($million) 83

TABLE 23 NORTH AMERICA: five-factor Authentication Market REVENUE, BY COUNTRY, 2012 – 2017 ($MILLION) 84

TABLE 24 Europe: five-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 85

TABLE 25 APAC: five-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 86

TABLE 26 ROW: five-factor Authentication Market REVENUE,

BY COUNTRY, 2012 – 2017 ($MILLION) 87

TABLE 27 multi-factor authentication MARKET REVENUE,

by APPLICATIONs, 2012 – 2017 ($MILLION) 90

TABLE 28 multi-factor authentication MARKET REVENUE, for Travel & immigration & transportation APPLICATION, by geography, 2012 – 2017 ($MILLION) 91

TABLE 29 north america: multi-factor Authentication Market REVENUE, for Travel & immigration and transportation APPLICATION,

BY COUNTRY, 2012 – 2017 ($MILLION) 92

TABLE 30 Europe: multi-factor Authentication Market REVENUE,

for Travel & immigration and transportation APPLICATION,

BY COUNTRY, 2012 – 2017 ($MILLION) 93

TABLE 31 APAC: multi-factor Authentication Market REVENUE,

for Travel & immigration and transportation APPLICATION,

BY COUNTRY, 2012 – 2017 ($MILLION) 94

TABLE 32 ROW: multi-factor Authentication Market REVENUE,

for Travel & immigration and transportation APPLICATION,

BY COUNTRY, 2012 – 2017 ($MILLION) 95

TABLE 33 multi-factor authentication MARKET REVENUE,

for government APPLICATION, by geography,

2012 – 2017 ($MILLION) 98

TABLE 34 north america: multi-factor Authentication Market REVENUE, for government APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 99

TABLE 35 Europe: multi-factor Authentication Market REVENUE,

for government APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 100

TABLE 36 APAC: multi-factor Authentication Market REVENUE,

for government APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 101

TABLE 37 ROW: multi-factor Authentication Market REVENUE,

for government APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 102

TABLE 38 multi-factor authentication MARKET REVENUE, for defense APPLICATION, by geography, 2012 – 2017 ($MILLION) 103

TABLE 39 north america: multi-factor Authentication Market REVENUE, for defense APPLICATION, BY COUNTRY, 2012 – 2017 ($MILLION) 104

TABLE 40 Europe: multi-factor Authentication Market REVENUE,

for defense APPLICATION, BY COUNTRY, 2012 – 2017 ($MILLION) 105

TABLE 41 APAC: multi-factor Authentication Market REVENUE,

for defense APPLICATION, BY COUNTRY, 2012 – 2017 ($MILLION) 106

TABLE 42 ROW: multi-factor Authentication Market REVENUE,

for government APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 107

TABLE 43 multi-factor authentication MARKET REVENUE, for banking & finance APPLICATION, by geography, 2012 – 2017 ($MILLION) 111

TABLE 44 north america: multi-factor Authentication Market REVENUE, for banking & finance APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 112

TABLE 45 Europe: multi-factor Authentication Market REVENUE,

for banking & finance APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 113

TABLE 46 APAC: multi-factor Authentication Market REVENUE,

for banking & finance APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 114

TABLE 47 ROW: multi-factor Authentication Market REVENUE,

for banking & finance APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 115

TABLE 48 multi-factor authentication MARKET REVENUE,

for Commercial Security APPLICATION, by geography,

2012 – 2017 ($MILLION) 116

TABLE 49 north america: multi-factor Authentication Market REVENUE, for Commercial Security APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 117

TABLE 50 Europe: multi-factor Authentication Market REVENUE,

for Commercial Security APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 118

TABLE 51 APAC: multi-factor Authentication Market REVENUE,

for Commercial Security APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 119

TABLE 52 ROW: multi-factor Authentication Market REVENUE,

for Commercial Security APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 120

TABLE 53 multi-factor authentication MARKET REVENUE, for consumer electronics APPLICATION, by geography, 2012 – 2017 ($MILLION) 121

TABLE 54 north america: multi-factor Authentication Market REVENUE, for consumer electronics APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 122

TABLE 55 Europe: multi-factor Authentication Market REVENUE,

for consumer electronics APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 123

TABLE 56 APAC: multi-factor Authentication Market REVENUE,

for consumer electronics APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 124

TABLE 57 ROW: multi-factor Authentication Market REVENUE,

for consumer electronics APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 125

TABLE 58 multi-factor authentication MARKET REVENUE, for healthcare APPLICATION, by geography, 2012 – 2017 ($MILLION) 127

TABLE 59 north america: multi-factor Authentication Market REVENUE, for healthcare APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 128

TABLE 60 Europe: multi-factor Authentication Market REVENUE,

for healthcare APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 129

TABLE 61 APAC: multi-factor Authentication Market REVENUE,

for healthcare APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 130

TABLE 62 ROW: multi-factor Authentication Market REVENUE,

for healthcare APPLICATION, BY COUNTRY,

2012 – 2017 ($MILLION) 131

TABLE 63 NORTH AMERICA: multi-factor authentication MARKET REVENUE, BY COUNTRY, 2012 – 2017 ($million) 134

TABLE 64 NORTH AMERICA: multi-factor authentication MARKET REVENUE, BY type, 2012 – 2017 ($million) 135

TABLE 65 NORTH AMERICA: multi-factor authentication MARKET REVENUE, BY applications, 2012 – 2017 ($million) 136

TABLE 66 u.s.: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 137

TABLE 67 u.s.: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 138

TABLE 68 Canada: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 140

TABLE 69 canada: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 141

TABLE 70 mexico: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 142

TABLE 71 mexico: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 143

TABLE 72 europe: multi-factor authentication MARKET REVENUE,

BY COUNTRY, 2012 – 2017 ($million) 146

TABLE 73 europe: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 147

TABLE 74 europe: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 148

TABLE 75 germany: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 150

TABLE 76 germany: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 151

TABLE 77 U.k.: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 152

TABLE 78 u.k.: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 153

TABLE 79 france: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 155

TABLE 80 france: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 156

TABLE 81 italy: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 158

TABLE 82 italy: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 159

TABLE 83 APAC: multi-factor authentication MARKET REVENUE,

BY COUNTRY, 2012 – 2017 ($million) 161

TABLE 84 APAC: multi-factor authentication MARKET REVENUE, BY types, 2012– 2017 ($million) 162

TABLE 85 apac: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 163

TABLE 86 australia: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 164

TABLE 87 australia: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 165

TABLE 88 China: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 166

TABLE 89 China: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 167

TABLE 90 japan: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 169

TABLE 91 japan: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 170

TABLE 92 south korea: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 171

TABLE 93 south korea: multi-factor authentication MARKET REVENUE, BY applications, 2012 – 2017 ($million) 172

TABLE 94 india: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 174

TABLE 95 india: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 175

TABLE 96 row: multi-factor authentication MARKET REVENUE,

BY COUNTRY, 2012 – 2017 ($million) 176

TABLE 97 row: multi-factor authentication MARKET REVENUE, BY types, 2012 – 2017 ($million) 177

TABLE 98 row: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 178

TABLE 99 middle east: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 180

TABLE 100 middle east: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 181

TABLE 101 africa: multi-factor authentication MARKET REVENUE,

BY types, 2012 – 2017 ($million) 182

TABLE 102 africa: multi-factor authentication MARKET REVENUE,

BY applications, 2012 – 2017 ($million) 183

TABLE 103 Ranking of non-biometric based multi-factor authentication provider 184

TABLE 104 biometric based multi-factor authentication provider & their services offered 185

TABLE 105 New product launch/development 187

TABLE 106 Mergers & Acquisitions 192

TABLE 107 Partnerships/agreements/strategic alliance/ collaboration 194

TABLE 108 Contract/deployment 198

TABLE 109 3M: Overall revenue, 2010 – 2011 ($billion) 202

TABLE 110 Product specifications 219

TABLE 111 FUJITSU: OVERALL REVENUE, 2011 – 2012 ($million) 222

TABLE 112 Identive Group: Company financials 2010 – 2011 ($million) 230

TABLE 113 NEC: Overall revenue, 2011 – 2012 ($Billion) 237

TABLE 114 RCG: Overall revenue, 2010 – 2011 ($million) 242

TABLE 115 Rsa'S Product description 245

TABLE 116 Sagem Morpho: Overall Revenue, 2010 – 2011 ($Million) 251

TABLE 117 Sagem Morpho: Security Revenue, By sectors,

2010 – 2011 ($Million) 251

TABLE 118 Products offered by SecurEnvoy 258

List of FIGURES

FIGURE 1 GLOBAL MULTI-FACTOR AUTHENTICATION MARKET segmentation 23

FIGURE 2 Steps of Research 25

FIGURE 3 Market Crackdown 26

FIGURE 4 Multi-Factor market breakdown strategy 27

FIGURE 5 Major categories of authentication factors 39

FIGURE 6 Sample pictures of USB biometric scanners 40

FIGURE 7 Multi-factor authentication by model 42

FIGURE 8 IMPACT ANALYSIS OF drivers 43

FIGURE 9 Growth of smartphones & tablets market (million units) 48

FIGURE 10 IMPACT ANALYSIS OF RESTRAINTS 49

FIGURE 11 Porter's five force model 53

FIGURE 12 Target Applications Of Multi-factor authentication Market 56

FIGURE 13 Maturity level of different model of multi-factor authentication 58

FIGURE 14 RISK OF EXPOSURE V/S TRANSACTION FREEQUENCY IN BANKING & FINANCE 109

FIGURE 15 Security offered by different methods of authentication. 110

FIGURE 16 Key growth strategies 186

FIGURE 17 Actividentity: Product overview 205

FIGURE 18 Actividentity, Inc.: Solutions overview 205

FIGURE 19 Products & services offered by confident technologies 207

FIGURE 20 Cross Match Technologies' key product line 210

FIGURE 21 Deepnet Security Ltd.: Major authentication Products & their types 213

FIGURE 22 Entrust Inc.: Major Sectors catering 216

FIGURE 23 EZMCOM's Operation & product segmentation 218

FIGURE 24 EZMCOM's list of products offered 219

FIGURE 25 Products offered by RSA security (Authentication) 245

FIGURE 26 Product line of safran Morpho 250

FIGURE 27 Sagem Morpho: Revenue breakup, by businesses, 2011 250

FIGURE 28 Products and services offered by Secugen 255

FIGURE 29 Authentication process using SMS Passcode 260

FIGURE 30 Products & services offered by suprema 263

FIGURE 31 Products offered by Technology Nexus AB 267

To order this report:

Security_Systems Industry: Multi-Factor Authentication Market - By Model/Type [Two, Three, Four & Five-Factor], Application [Banking & Finance, Healthcare, Government, Defense, Travel & Immigration, Consumer Electronics & Commercial Security] & Geography – Forecasts (2012 – 2017)

Contact Nicolas: [email protected]
US: (805)-652-2626
Intl: +1 805-652-2626

SOURCE Reportlinker

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
Wearable devices have come of age. The primary applications of wearables so far have been "the Quantified Self" or the tracking of one's fitness and health status. We propose the evolution of wearables into social and emotional communication devices. Our BE(tm) sensor uses light to visualize the skin conductance response. Our sensors are very inexpensive and can be massively distributed to audiences or groups of any size, in order to gauge reactions to performances, video, or any kind of presentation. In her session at @ThingsExpo, Jocelyn Scheirer, CEO & Founder of Bionolux, will discuss ho...
Cloud data governance was previously an avoided function when cloud deployments were relatively small. With the rapid adoption in public cloud – both rogue and sanctioned, it’s not uncommon to find regulated data dumped into public cloud and unprotected. This is why enterprises and cloud providers alike need to embrace a cloud data governance function and map policies, processes and technology controls accordingly. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Compliance Strategy Leader at Cisco Systems, will focus on how to set up a cloud data governance program and s...
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing demand and the rapidly changing workspace model.
As organizations shift toward IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection &E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 16th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships, will discuss how to cut costs, scale easily, and unleash insight with CommVault Simpana software, the only si...
Hadoop as a Service (as offered by handful of niche vendors now) is a cloud computing solution that makes medium and large-scale data processing accessible, easy, fast and inexpensive. In his session at Big Data Expo, Kumar Ramamurthy, Vice President and Chief Technologist, EIM & Big Data, at Virtusa, will discuss how this is achieved by eliminating the operational challenges of running Hadoop, so one can focus on business growth. The fragmented Hadoop distribution world and various PaaS solutions that provide a Hadoop flavor either make choices for customers very flexible in the name of opti...
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch of Docker's initial release in March of 2013, interest was revved up several notches. Then late last...
Roberto Medrano, Executive Vice President at SOA Software, had reached 30,000 page views on his home page - http://RobertoMedrano.SYS-CON.com/ - on the SYS-CON family of online magazines, which includes Cloud Computing Journal, Internet of Things Journal, Big Data Journal, and SOA World Magazine. He is a recognized executive in the information technology fields of SOA, internet security, governance, and compliance. He has extensive experience with both start-ups and large companies, having been involved at the beginning of four IT industries: EDA, Open Systems, Computer Security and now SOA.
HP and Aruba Networks on Monday announced a definitive agreement for HP to acquire Aruba, a provider of next-generation network access solutions for the mobile enterprise, for $24.67 per share in cash. The equity value of the transaction is approximately $3.0 billion, and net of cash and debt approximately $2.7 billion. Both companies' boards of directors have approved the deal. "Enterprises are facing a mobile-first world and are looking for solutions that help them transition legacy investments to the new style of IT," said Meg Whitman, Chairman, President and Chief Executive Officer of HP...
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focused on understanding how industrial data can create intelligence for industrial operations. Imagine ...
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing and analyzing streaming data is the Lambda Architecture, representing a model of how to analyze rea...
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes for use cases across the industrial, enterprise, and consumer segments.
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
SYS-CON Events announced today that Open Data Centers (ODC), a carrier-neutral colocation provider, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Open Data Centers is a carrier-neutral data center operator in New Jersey and New York City offering alternative connectivity options for carriers, service providers and enterprise customers.
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add scalable realtime functionality with minimal effort and cost.”
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, including what it is today, what it might ultimately be, the role of wearable tech, and technology gaps stil...
With several hundred implementations of IoT-enabled solutions in the past 12 months alone, this session will focus on experience over the art of the possible. Many can only imagine the most advanced telematics platform ever deployed, supporting millions of customers, producing tens of thousands events or GBs per trip, and hundreds of TBs per month. With the ability to support a billion sensor events per second, over 30PB of warm data for analytics, and hundreds of PBs for an data analytics archive, in his session at @ThingsExpo, Jim Kaskade, Vice President and General Manager, Big Data & Ana...
In the consumer IoT, everything is new, and the IT world of bits and bytes holds sway. But industrial and commercial realms encompass operational technology (OT) that has been around for 25 or 50 years. This grittier, pre-IP, more hands-on world has much to gain from Industrial IoT (IIoT) applications and principles. But adding sensors and wireless connectivity won’t work in environments that demand unwavering reliability and performance. In his session at @ThingsExpo, Ron Sege, CEO of Echelon, will discuss how as enterprise IT embraces other IoT-related technology trends, enterprises with i...
When it comes to the Internet of Things, hooking up will get you only so far. If you want customers to commit, you need to go beyond simply connecting products. You need to use the devices themselves to transform how you engage with every customer and how you manage the entire product lifecycle. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, will show how “product relationship management” can help you leverage your connected devices and the data they generate about customer usage and product performance to deliver extremely compelling and reliabl...