analysis of the strong authentication and one time password (otp) market

15
The World has Changed, Weakening the Security Once Afforded by Passwords Research PREVIEW for the Analysis of the Strong Authentication and One- Time Password (OTP) Market @FS_TVision

Upload: frost-sullivan

Post on 20-Aug-2015

2.336 views

Category:

Technology


1 download

TRANSCRIPT

The World has Changed, Weakening the

Security Once Afforded by Passwords

Research PREVIEW for the

Analysis of the Strong Authentication and One-

Time Password (OTP) Market

@FS_TVision

Sample of Key Highlights

• Authentication establishes a bond of trust between an organization and the

user who is requesting system access. Strong authentication refers to

methods of authenticating users with a level of validation that is beyond that

of simple username and password.

• The total market for strong authentication grew to $1.53 billion in 2013.

• 2013 was a “watershed” year for strong authentication in that biometrics

became the largest segment of strong authentication technology. Much of

the momentum in biometrics is being driven by the use of voice biometrics,

especially in call center and interactive voice response (IVR) applications.

• The total market will grow to $2.1 billion by 2018, representing a compound

annual growth rate of almost 7 percent.

• RSA remains the largest vendor in the market, with about one-fifth of the

market revenue. This is down from 2010 when RSA had approximately

one-quarter of the market revenue. The decline is market revenue is less

about RSA’s performance and more about a growing market for new

authentication methods.

Source: Frost & Sullivan analysis.

Drivers and Restraints

Strong Authentication Market: Key Market Drivers and Restraints, Global, 2013–2018

Large Installed base of existing solutionsH H M

Resistance to change within the security communityH M L

Mature strong authentication methods are expensive and

inconvenientM M L

Vendors communicate in terms of features rather than

quantifiable benefitsL L L

1–2 years 3–4 years 5–6 years

Movement to cloud-based servicesH H H

Single, federated sign-on to SaaS appsM H H

Growth of the threat landscapeM H H

Open Standards ApproachesL M H

Compliance mandates strong authentication L L M

Impact: H High M Medium L LowNote: Drivers & Restraints are ranked in order of impact. Source: Frost & Sullivan analysis.

Mark

et

Dri

vers

Mark

et

Restr

ain

ts

Executive Summary—CEO’s Perspective

2The authentication form factor used should be determined by types of authentication needs.

3There are a number of emerging alternatives to hardware OTP. Security professionals should apply an open mind.

4

Authentication methods should be viewed as a method to manage risk. Companies need multiple methods of authentication to properly match the strength/convenience of the authentication method to the level of risk to be managed.

1

According to the 2012 Verizon Breach Investigation Report1, weak or stolen login credentials were a factor in over 76 percent of the breaches analyzed.

Source: Frost & Sullivan analysis.1-To download this study, go to: http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf

Details of the Full Analysis

Contents

Section Slide Number

Executive Summary 5

Market Overview 11

Total Market -

• External Challenges: Drivers and Restraints 32

• Forecasts and Trends 47

• Market Share and Competitive Analysis 59

• Innovations for Stronger Authentication 69

The Last Word (Conclusions and Implications) 83

Select Company Profiles 92

Appendix 109

List of Exhibits

Figure Slide Number

Total OTP Market: Distribution Channel Analysis, Global, 2013 32

Strong Authentication Market: Key Market Drivers and Restraints, Global, 2013–2018 35

Importance of Features in Decision to Choose/Consider Cloud Software Service Providers 37

Strong Authentication Market: Revenue Forecast, Global, 2010–2018 50

Strong Authentication Market: Revenue Forecast, Global, 2010–2018 51

Total OTP Market: Prices of OTP Product Per User, Global, 2011, 2013, 2015 55

Total Strong Authentication Market: Revenue Forecast by Vertical Market, Global, 2010-2018 56

Percent of Revenue, Total Strong Authentication: Global, 2013 60

Percent of Revenue, Total Strong Authentication: Global, 2010 & 2013 62

List of Exhibits

Figure Slide Number

Agnitio Strong Authentication Revenue 2009-2013 94

Entrust Authentication Revenue 2009-2013 95

Gemalto Authentication Revenue 2009-2013 96

Giesecke & Devrient Authentication Revenue 2009-2013 97

HID Global Authentication Revenue 2009-2013 98

Hitachi Authentication Revenue 2009-2013 99

IBM ZTIC Authentication Revenue 2009-2013 100

ID Control Authentication Revenue 2009-2013 101

KOBIL Systems Authentication Revenue 2009-2013 102

List of Exhibits

Figure Slide Number

NEC Authentication Revenue 2009-2013 103

Nuance Communications Authentication Revenue 2009-2013 104

PhoneFactor Authentication Revenue 2009-2013 105

RSA Authentication Revenue 2009-2013 106

SafeNet Authentication Revenue 2009-2013 107

SecureAuth Authentication Revenue 2009-2013 108

SyferLock Authentication Revenue 2009-2013 109

Symantec Authentication Revenue 2009-2013 110

VASCO Authentication Revenue 2009-2013 111

Yubico Authentication Revenue 2009-2013 112

Market Overview—Key Questions This Study Will

Answer

What is strong authentication and why is it needed?

What are the predominant methods of strong authentication?

How will the structure of the market change with time?

What is the future of the hardware token?

What is the market size for strong authentication from 2010 to 2018?

What is the strong authentication revenue for the leading vendors by hardware token, software token, USB key, and biometrics?

Source: Frost & Sullivan analysis.

Partial List of Companies Interviewed

1. Agnitio

2. Authen2cate

3. Comodo

4. Duo Security

5. Entrust

6. FIDO Alliance

7. Giesecke & Devrient

8. GlobalSign

9. HID Global (ActivID)

10. IBM

11. ID Control

12.Lieberman Software

13.mBlox

14.Nok Nok Lads

15.Nuance

16.NXP

17.RSA

18.SafeNet

19.Scio Security

20.SecureAuth

21.SecurEnvoy

22.Swivel Secure

23.Symantec

24.SyferLock

25.TeleSign

26.TextPower

27.VASCO

28.Verizon

29.Yubico

Source: Frost & Sullivan research.

Associated Multimedia

GIL TalksFrost & Sullivan Thought Leadership Videoshttp://www.gilcommunity.com/gil-talks

Analyst BlogsInformation & Communication Technologies http://bit.ly/Y153CG

Analyst BriefingsComplimentary ICT Webinarshttp://bit.ly/1f9CZV6

SlideShareFrost & Sullivan’s Technology Presentations http://slidesha.re/1oMWgy4

Market Insight ArticlesComplimentary ICT Analyst Insightshttp://bit.ly/1jNWvIJ

Visionary IT PortalFrost & Sullivan's Interactive ICT Communityhttp://visionary-it.gilcommunity.com/

Interested in Full Access? Connect With Us

Britni MyersCorporate Communications

(210) 477-8481

[email protected]

Research Authors

Lead Analyst:

Frank DicksonIndustry PrincipalNetwork SecurityFrost & Sullivan

Contributing Analyst:

Chris RodriguezSenior Industry

AnalystNetwork SecurityFrost & Sullivan

Research Director:

Michael SubyVice President of

ResearchStratecast | Frost &

Sullivan

Facebookhttps://www.facebook.com/FrostandSullivan

LinkedIn ICT Grouphttp://linkd.in/1kS4C7c

SlideSharehttp://www.slideshare.net/FrostandSullivan

ICT Twitterhttps://twitter.com/FS_ITVision

Frost & Sullivan Eventshttp://bit.ly/MvPRbQ

Global Perspective40+ Offices Monitoring for Opportunities and Challenges

Industry ConvergenceComprehensive Industry Coverage Sparks Innovation Opportunities

Automotive&

Transportation

Aerospace & Defense Measurement &

Instrumentation

Information &

Communication Technologies

HealthcareEnvironment & Building

Technologies

Energy & Power

Systems

Chemicals, Materials

& Food

Electronics &

Security

Industrial Automation

& Process Control

Automotive

Transportation & Logistics

Consumer

Technologies

Minerals & Mining