SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
50 Years of Growth, Innovation and Leadership
A Frost & Sullivan
Executive Summary
Jean-Noël Georges
Program Director
www.frost.com
An Overview and Competitive Analysis
of the One-Time Password (OTP) Market
Frost & Sullivan
CONTENTS
Introduction.............................................................................................................................	3
OTP Market Landscape..........................................................................................................	4
Market Drivers......................................................................................................................	 5
Competitive Analysis..............................................................................................................	7
RSA, the Security Division of EMC.......................................................................................	 7
Key Performance Drivers for RSA.........................................................................................	8
Conclusion...............................................................................................................................	9
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
3Frost.com
INTRODUCTION
Over the past year,data breaches have impacted organizations of all types and sizes; from large
organizations to small businesses or governmental agencies, nobody is immune. As a result,
firms continue to invest in—and prioritize—information security.From an industry perspective,
variations are evident. For example, while the financial services, IT and government sectors
emphasize security strategy as a high priority, entertainment and travel companies invest less
in this area.
With the explosion of smartphone adoption, the number of people making purchases via
a mobile device has increased significantly. As eCommerce became mCommerce, payment
security became an area of considerable focus. During a “card not present” payment process,
a personal account number (PAN), expiration date, and card validation code (CVC) are not
enough to completely secure the transaction. However, new mechanisms such as 3D Secure
appear to increase the confidence of both consumers and eMerchants.
However, protecting a mobile device itself is necessary to ensure that only the owner is able
to use it. Although a simple mechanism such as a personal identification number (PIN) can
perform this task, in 2011, more than 60% of smartphone users were not using a PIN to
protect their mobile device.
Traditional password protection is not enough. Statistically speaking, well-known passwords
such as “1234”, “password” or “love” allow hackers to access personal data in 20% of the
cases. If this hacking strategy is coupled with a range of tools to obtain personal data (written
piece of software, keylogger, etc.) the chance to break the password could reach 55%.
In order to decrease the number of security breaches due to phishing, keyboard logging,
man-in-the-middle attacks or other methods, companies are integrating mobile OTP
(one-time password), OTP tokens and USB tokens. The OTP solution adds another level of
security protection as the use of a temporary password strongly protects network access and
end users.
Frost & Sullivan
4 Frost.com
Figure 1–Total OTP Market:Vertical Market Analysis, Global, 2012
Others
2.0%
Finance
38.0%
Government
27.0%
Healthcare
15.0%
Tech/Telcom
10.0%
Manufacturing
8.0%
Source: Frost & Sullivan
OTP MARKET LANDSCAPE
Due to the widespread adoption of the Internet and wireless devices,there is a specific need to
fully secure digital home networks and associated services.The emergence of mobile payments
(online payment by using website platform or specific application) has increased this security
need. Strong authentication solutions improve the security level by incorporating another
security measure to overcome the weaknesses and limitations of static passwords.
As shown in Figure 2, the global OTP market is growing at a compound annual growth rate
(CAGR) of 7.5%. In 2012, the market was valued at $824.7 million and is projected to grow to
$1.189 billion by 2017.
Figure 2–Total OTP Market: Revenue Forecast (Global), 2011-2017
Total OTP Market: Revenue Forecast Global, 2011-2017
Revenue CAGR, 2012-2017 = 7.5%
Revenue($Million)
GrowthRate(%)
1,200.0
1,000.0
800.0
600.0
400.0
200.0
0.0
8.0
7.0
6.0
5.0
4.0
3.0
2.0
1.0
0.0
Revenue ($ Million)
Growth Rate (%)
2011 2012 2013 2014 2015 2016 2017
770.6 824.7 891.2 956.1 1027 1104.5 1189.4
7.0 7.0 8.1 7.3 7.4 7.5 7.7
Source: Frost & Sullivan
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
5Frost.com
OTP market revenue is driven by hardware and the USBToken market. This source of revenue
generates 83.7% of the total OTP market. The dominance of these revenue sources is not a
surprise, as these solutions are adopted by a significant proportion of companies. This type of
additional security measure has prompted rapid development of OTP solutions to deliver a
cost-effective solution to corporate clients. Verticals such as physical and logical access, online
payment or online gaming are the main areas of development. But the wide distribution of
smartphones and tablets, coupled with new usage cases such as BYOD, are further boosting
demand for OTP solutions. Both enterprises and financial institutions will be motivated to
invest in hardware OTP solutions, even if the software OTP market continues to be attractive.
It generated 16.3% of revenue for the total OTP market.
Market Drivers
As the volume of threats and the variety of breaches continue to grow, security protection
is a constant battle for companies. This year, a higher level of scale was reached when the US
government reported that more than 94 million records (containing personal information)
have been exposed since 2009 in the US alone. Nearly 81 million of these were due to the
loss or theft of mobile devices. High-profile instances involving major companies have also
emerged. For example, Yahoo! was attacked in July 2012, with a reported 400,000 plain-
text passwords stolen. Apple also revealed that a million Apple Unique Device Identifiers
(UDIDs) were hacked in September 2012. The proliferation of identity theft and data breaches
is the result of single-factor methods of authentication or weak passwords. Figure 3 describes
the most influential market drivers that increase demand for OTP solutions.
Figure 3–Total OTP Market: Key Market Drivers (Global), 2013-2018
MarketDrivers
H
H
H
H
H
H
H
M
MM
H
H
MMH
Compliance with legislations, regulations and standards
Need for two-factor authentication
Security cost rationalization
Proliferation of Identity theft and data breaches
BYOD and cloud applications promote OTP adoption
1-2 years 3-4 years 5 years
Source: Frost & Sullivan
•	 Compliance with legislations, regulations and standards: With the recent
controversy information regarding NSA activity and the PRISM program, citizens will
probably be less reluctant to use strong authentication methods to access the network
or their personal data. With data security as a current major focus point, compliance
regulations and legislation continue to push organizations to use technology that
will effectively ensure the proper handling of sensitive data. This is particularly true for
payment and financial purposes with the Federal Financial Institutions Examination Council
(FFIEC) and the Payment Card Industry Data Security Standard (PCI-DSS), but is also
Frost & Sullivan
6 Frost.com
needed to protect health data following the Health InformationTechnology for Economic
and Clinical Health (HITECH) act. The emergence of governmental online services such
as tax declaration has compelled OTP solution providers to adhere to Identification-
Authentication-Signature European Citizen Card (IAS-ECC) in Europe.
•	 Need for two-factor authentication: This authentication method is now the most
popular globally and could drastically reduce the incidence of online security breaches.
As the name suggests, this solution provides two means of identification: something
that the user has (token) and something that the user knows (PIN). This is a minimum
requirement for network access or digital identification. Some industries are already
looking to stronger authentication methods,such as three-factor authentication,by adding
biometric data.
•	 Security cost rationalization: Overcoming legacy hardware token authentication is
a challenge for many organizations. Whether it be changing OTP providers or switching
to software-based authentication solutions, a change requires IT decision-makers to be
open-minded. With further education, decision-makers have come to understand the
benefits of software-based authentication and the use of more than a single form factor.
OTP vendors are working to change the perception of complex deployments by developing
platforms that promote interoperability and multiple forms of two-factor authentication.
The multiple network security breaches of 2012 that affected entities such as LinkedIn,
Nationwide Insurance and Apple have proven that any organization can be a target, or
susceptible to either a highly sophisticated attack or a small vulnerability in an application.
•	 Proliferation of identity theft and data breaches: 2012 was the year of data breach
proliferation, not only due to the increasing number of attacks, but also by the emergence
of large-scale data breaches. As the total number of Internet/mobile connections and
online payments has drastically increased, so has the total number of identity thefts and
data breaches. Identity theft gives a really negative influence to the market when it impacts
bank accounts security. This influence is lower when it comes from social media accounts
security. The emergence of mobile and online payment solutions created a specific need
to protect data and deliver enhanced security. The lack of international rules for data
protection allows the OTP solution to be seen as a trustable service by providing an easy-
to-install security solution.
•	 BYOD and cloud applications promote OTP adoption: The explosion of
smartphones and tablets has changed the way people use professional and personal
communication devices. The use of professional tablets is minor compared to consumer
tablets. Indeed, globally, the average percentage of professional tablets shipped will be
0.8% (2012-2017) when in the same time consumer tablets will reach 92.9% (2012-2017)
and E-Readers 6.3% (2012-2017). Finally, Mobile Device Management (MDM), Identity
Access Management (IAM) and even NFC payment are moving into the cloud. This trend
is the perfect answer to accelerate adoption of services and to decrease total investment
costs. However, the security of the cloud should be aligned to company policies. OTP,
in that case, is an accurate answer. The solution is accessible at any time, from any device,
and anywhere.
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
7Frost.com
COMPETITIVE ANALYSIS
The security industry is evolving rapidly in response to the explosion of mobile devices and the
emergence of new usages such as mobile payment and remote access. Only simple solutions
coupled with minimal investment will survive in this competitive landscape.The need to have
an authentication solution that is easy to use and that can allow a Single Sign On (SSO) element
is crucial. But an optimized, secured solution should also reach a high level of security by
providing reliable and strong authentication. OTP authentication vendors have understood
these market constraints and provided a broad range of authentication solutions in 2012.
Competitive positioning within the global 2012 OTP market is shown in Figure 4. In 2012,
RSA confirmed its leadership position with a broad product portfolio and large choice of
form factors.
Figure 4–Total OTP Market Competitor Positioning Analysis (Global), 2012
Market PenetrationMarket Contenders Market Challengers Market Leader
AbilitytoDeliver
Gemalto
Entrust
RSA
SymantecActivIdentity
VASCO
Data Security
SafeNet
Kobil
Source: Frost & Sullivan
RSA,the Security Division of EMC
RSA has developed a popular set of solutions for authentication. For the enterprise market,
the firm is seen as the most secure partner for two-factor authentication. For many years,
RSA has created a complete two-factor authentication product portfolio. These solutions can
be coupled with RSA’s authentication manager in order to centralize all security tokens and
user profiles.
Frost & Sullivan
8 Frost.com
As shown in Figure 5, RSA led the market with 45.1% revenue share within the global OTP
market in 2012.
Figure 5–Total OTP Market Percent of Revenue (Global), 2012
RSA
45.1%
Competitor 1
18.9%
Competitor 2
11.7%
Competitor 3
8.8%
Competitor 4
4.8%
Competitor 5
3.5%
Competitor 6
2.1% Competitor 7
2.0%
Others
3.0%
Source: Frost & Sullivan
Today, a static security solution is insufficient,and the need for a real-time and dynamic security
solution is clear. Much like banks and financial institutions that are using risk management to
optimize payment security levels, RSA has decided to use risk management to enhance its
authentication services to better answer specific security requirements.
Key Performance Drivers for RSA
Wide Range of Innovative Products
With more than 30 years of experience in the authentication business, RSA has built a solid
reputation of reliable authentication solutions by using the latest security standards and strong
cryptography mechanisms. Most of these technologies are patented, and as such, guarantee a
strong market footprint. Authenticators could be used for authentication management, but
also to encipher and protect hard disks or to generate digital signature for emails or during
data transactions.
Personalized and Best-in-Class Solutions
RSA designed its business strategy by employing a customer-centric approach. Multiple form
factors and options (such as authentication manager) are available. For an enterprise or an
individual, a customized solution is crucial,as long as it is coupled with a reliable token. RSA has
developed convenient products that are aligned with client expectations. Consequently, SMBs
are able to find secure solutions to protect their network access. SMBs that were reluctant
to deploy authentication solutions because of the high investment cost can now use cost-
effective, risk-based and on-demand authentication systems.
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
9Frost.com
Flexibility
RSA has designed all of its products in order to facilitate final integration with a minimum of
time and money. RSA solutions can be easily installed with more than 400 partner solutions
used for network access,VPN or firewall. This strategy offers true benefit, as RSA product
deployment does not need specific project or long-term investment. RSA’s OTP products are
designed to be compatible with all major physical software platforms or virtual ones such as
VMware. The architecture of the solution grants replication and evolution of the entire system.
As a result, RSA’s products offer flexibility and control over total investment.
CONCLUSION
The OTP market is evolving from the hardware form factor to solutions answering the
need for mobility and flexibility. The shift to more mobile-centric demand is driven by the
widespread adoption of mobile devices and mobile payment/banking solutions. Enterprises are
looking for specific security solutions in order to avoid data breaches and identity theft. At
the same time, new requirements have emerged such as email encryption, digital signature and
mobile access. Most OTP vendors have evolved their traditional product portfolio to better
answer the changing needs of end users. As a result, the software OTP market is growing and
many OTP vendors are providing specific credentials for NFC or Bluetooth purposes. OTP is
moving to software-based solutions to leverage mobile devices as trustable identity providers.
877.GoFrost • myfrost@frost.com
http://www.frost.com
About Frost & Sullivan
Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary
innovation that addresses the global challenges and related growth opportunities that will make or break today’s
market participants.For more than 50 years,we have been developing growth strategies for the Global 1000,emerging
businesses, the public sector and the investment community. Is your organization prepared for the next profound
wave of industry convergence, disruptive technologies, increasing competitive intensity, Mega Trends, breakthrough
best practices, changing customer dynamics and emerging economies? Contact Us: Start the Discussion
For information regarding permission, write:
Frost & Sullivan
331 E. Evelyn Ave. Suite 100
MountainView, CA 94041
SiliconValley
331 E. Evelyn Ave. Suite 100
MountainView, CA 94041
Tel 650.475.4500
Fax 650.475.1570
San Antonio
7550 West Interstate 10, Suite 400,
San Antonio,Texas 78229-5616
Tel 210.348.1000
Fax 210.348.1003
London
4 Grosvenor Gardens
London SW1W 0DH
Tel +44 (0)20 7343 8383
Fax +44 (0)20 7730 3343
Auckland
Bahrain
Bangkok
Beijing
Bengaluru
Bogotá
Buenos Aires
Cape Town
Chennai
Colombo
Delhi / NCR
Detroit
Dubai
Frankfurt
Iskander Malaysia/Johor Bahru
Istanbul
Jakarta
Kolkata
Kuala Lumpur
London
Manhattan
Mexico City
Miami
Milan
Mumbai
Moscow
Oxford
Paris
Pune
Rockville Centre
San Antonio
São Paulo
Seoul
Shanghai
Shenzhen
SiliconValley
Singapore
Sophia Antipolis
Sydney
Taipei
Tel Aviv
Tokyo
Toronto
Warsaw
Washington, DC

Mais conteúdo relacionado

Mais procurados

Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerceVipin Subhash
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enBankir_Ru
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Graeme Cross
 
Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...
Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...
Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...yStats.com
 
Market Research Report : Software Market in China 2012
Market Research Report :  Software Market in China 2012Market Research Report :  Software Market in China 2012
Market Research Report : Software Market in China 2012Netscribes, Inc.
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 
IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...
IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...
IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...StatsCommunications
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Echoworx
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015TransUnion
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Data Fraud Analytics Industry
Data Fraud Analytics Industry Data Fraud Analytics Industry
Data Fraud Analytics Industry Cole Secor
 

Mais procurados (17)

Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...
Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...
Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Market Research Report : Software Market in China 2012
Market Research Report :  Software Market in China 2012Market Research Report :  Software Market in China 2012
Market Research Report : Software Market in China 2012
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...
IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...
IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Data Fraud Analytics Industry
Data Fraud Analytics Industry Data Fraud Analytics Industry
Data Fraud Analytics Industry
 
Red Flag Rules
Red Flag RulesRed Flag Rules
Red Flag Rules
 

Destaque

SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
 
Mobile solutions strategy for a retail bank
Mobile solutions strategy for a retail bankMobile solutions strategy for a retail bank
Mobile solutions strategy for a retail bankAlexey Kazakov
 
One Time Password - A two factor authentication system
One Time Password  - A two factor authentication systemOne Time Password  - A two factor authentication system
One Time Password - A two factor authentication systemSwetha Kogatam
 
One time password(otp)
One time password(otp)One time password(otp)
One time password(otp)Anjali Agrawal
 
Dossier Del Centro Cordoba
Dossier Del Centro CordobaDossier Del Centro Cordoba
Dossier Del Centro Cordobacarlos a
 
Constancias de confinación
Constancias de confinaciónConstancias de confinación
Constancias de confinaciónBraulio Angulo
 
15.03.02 Seminole Stiles RGD letter
15.03.02 Seminole Stiles RGD letter15.03.02 Seminole Stiles RGD letter
15.03.02 Seminole Stiles RGD letterMichael McDermott
 
Creative Concepts General Presentation
Creative Concepts General PresentationCreative Concepts General Presentation
Creative Concepts General PresentationSocial Media Dokters
 
Us patent cases weekly update march 10th march 17th 2015
Us patent cases weekly update  march 10th march 17th 2015Us patent cases weekly update  march 10th march 17th 2015
Us patent cases weekly update march 10th march 17th 2015InvnTree IP Services Pvt. Ltd.
 
Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...
Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...
Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...Esade Creapolis
 
Landbote Social Media Factsheets (alle)
Landbote Social Media Factsheets (alle)Landbote Social Media Factsheets (alle)
Landbote Social Media Factsheets (alle)Hofrat Suess AG
 
Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...
Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...
Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...Sogepsa
 
Vijnos e
Vijnos eVijnos e
Vijnos eJ SL
 

Destaque (19)

An RSA Type OTP Generator
An RSA Type OTP GeneratorAn RSA Type OTP Generator
An RSA Type OTP Generator
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
Mobile solutions strategy for a retail bank
Mobile solutions strategy for a retail bankMobile solutions strategy for a retail bank
Mobile solutions strategy for a retail bank
 
One Time Password - A two factor authentication system
One Time Password  - A two factor authentication systemOne Time Password  - A two factor authentication system
One Time Password - A two factor authentication system
 
One Time Password
One Time PasswordOne Time Password
One Time Password
 
One time password(otp)
One time password(otp)One time password(otp)
One time password(otp)
 
CEI PRAISE - Framework Programme
CEI PRAISE - Framework Programme CEI PRAISE - Framework Programme
CEI PRAISE - Framework Programme
 
Dossier Del Centro Cordoba
Dossier Del Centro CordobaDossier Del Centro Cordoba
Dossier Del Centro Cordoba
 
Llatinismes Aforismes
Llatinismes AforismesLlatinismes Aforismes
Llatinismes Aforismes
 
Constancias de confinación
Constancias de confinaciónConstancias de confinación
Constancias de confinación
 
15.03.02 Seminole Stiles RGD letter
15.03.02 Seminole Stiles RGD letter15.03.02 Seminole Stiles RGD letter
15.03.02 Seminole Stiles RGD letter
 
Creative Concepts General Presentation
Creative Concepts General PresentationCreative Concepts General Presentation
Creative Concepts General Presentation
 
Andi Agrosoaie
Andi AgrosoaieAndi Agrosoaie
Andi Agrosoaie
 
Us patent cases weekly update march 10th march 17th 2015
Us patent cases weekly update  march 10th march 17th 2015Us patent cases weekly update  march 10th march 17th 2015
Us patent cases weekly update march 10th march 17th 2015
 
Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...
Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...
Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...
 
Landbote Social Media Factsheets (alle)
Landbote Social Media Factsheets (alle)Landbote Social Media Factsheets (alle)
Landbote Social Media Factsheets (alle)
 
ztevan mary
ztevan maryztevan mary
ztevan mary
 
Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...
Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...
Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...
 
Vijnos e
Vijnos eVijnos e
Vijnos e
 

Semelhante a An Overview and Competitive Analysis of the One-Time Password (OTP) Market

Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFAlexander Goodwin
 
Intrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docxIntrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docxsonubot1
 
Buy Recommendation for Palo Alto Networks
Buy Recommendation for Palo Alto NetworksBuy Recommendation for Palo Alto Networks
Buy Recommendation for Palo Alto NetworksZsofia Szurovszki
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
Managing Mobile Menaces
Managing Mobile MenacesManaging Mobile Menaces
Managing Mobile MenacesNalneesh Gaur
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
2008 Trends
2008 Trends2008 Trends
2008 TrendsTBledsoe
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape mercatoradvisory
 
Payment Security Market by Product Type, Distribution Channel, End User 2024-...
Payment Security Market by Product Type, Distribution Channel, End User 2024-...Payment Security Market by Product Type, Distribution Channel, End User 2024-...
Payment Security Market by Product Type, Distribution Channel, End User 2024-...IMARC Group
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 

Semelhante a An Overview and Competitive Analysis of the One-Time Password (OTP) Market (20)

Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDF
 
Intrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docxIntrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docx
 
Buy Recommendation for Palo Alto Networks
Buy Recommendation for Palo Alto NetworksBuy Recommendation for Palo Alto Networks
Buy Recommendation for Palo Alto Networks
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Managing Mobile Menaces
Managing Mobile MenacesManaging Mobile Menaces
Managing Mobile Menaces
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Top online frauds 2010
Top online frauds 2010Top online frauds 2010
Top online frauds 2010
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
Payment Security Market by Product Type, Distribution Channel, End User 2024-...
Payment Security Market by Product Type, Distribution Channel, End User 2024-...Payment Security Market by Product Type, Distribution Channel, End User 2024-...
Payment Security Market by Product Type, Distribution Channel, End User 2024-...
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 

Mais de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Mais de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

An Overview and Competitive Analysis of the One-Time Password (OTP) Market

  • 1. 50 Years of Growth, Innovation and Leadership A Frost & Sullivan Executive Summary Jean-Noël Georges Program Director www.frost.com An Overview and Competitive Analysis of the One-Time Password (OTP) Market
  • 2. Frost & Sullivan CONTENTS Introduction............................................................................................................................. 3 OTP Market Landscape.......................................................................................................... 4 Market Drivers...................................................................................................................... 5 Competitive Analysis.............................................................................................................. 7 RSA, the Security Division of EMC....................................................................................... 7 Key Performance Drivers for RSA......................................................................................... 8 Conclusion............................................................................................................................... 9
  • 3. An Overview and Competitive Analysis of the One-Time Password (OTP) Market 3Frost.com INTRODUCTION Over the past year,data breaches have impacted organizations of all types and sizes; from large organizations to small businesses or governmental agencies, nobody is immune. As a result, firms continue to invest in—and prioritize—information security.From an industry perspective, variations are evident. For example, while the financial services, IT and government sectors emphasize security strategy as a high priority, entertainment and travel companies invest less in this area. With the explosion of smartphone adoption, the number of people making purchases via a mobile device has increased significantly. As eCommerce became mCommerce, payment security became an area of considerable focus. During a “card not present” payment process, a personal account number (PAN), expiration date, and card validation code (CVC) are not enough to completely secure the transaction. However, new mechanisms such as 3D Secure appear to increase the confidence of both consumers and eMerchants. However, protecting a mobile device itself is necessary to ensure that only the owner is able to use it. Although a simple mechanism such as a personal identification number (PIN) can perform this task, in 2011, more than 60% of smartphone users were not using a PIN to protect their mobile device. Traditional password protection is not enough. Statistically speaking, well-known passwords such as “1234”, “password” or “love” allow hackers to access personal data in 20% of the cases. If this hacking strategy is coupled with a range of tools to obtain personal data (written piece of software, keylogger, etc.) the chance to break the password could reach 55%. In order to decrease the number of security breaches due to phishing, keyboard logging, man-in-the-middle attacks or other methods, companies are integrating mobile OTP (one-time password), OTP tokens and USB tokens. The OTP solution adds another level of security protection as the use of a temporary password strongly protects network access and end users.
  • 4. Frost & Sullivan 4 Frost.com Figure 1–Total OTP Market:Vertical Market Analysis, Global, 2012 Others 2.0% Finance 38.0% Government 27.0% Healthcare 15.0% Tech/Telcom 10.0% Manufacturing 8.0% Source: Frost & Sullivan OTP MARKET LANDSCAPE Due to the widespread adoption of the Internet and wireless devices,there is a specific need to fully secure digital home networks and associated services.The emergence of mobile payments (online payment by using website platform or specific application) has increased this security need. Strong authentication solutions improve the security level by incorporating another security measure to overcome the weaknesses and limitations of static passwords. As shown in Figure 2, the global OTP market is growing at a compound annual growth rate (CAGR) of 7.5%. In 2012, the market was valued at $824.7 million and is projected to grow to $1.189 billion by 2017. Figure 2–Total OTP Market: Revenue Forecast (Global), 2011-2017 Total OTP Market: Revenue Forecast Global, 2011-2017 Revenue CAGR, 2012-2017 = 7.5% Revenue($Million) GrowthRate(%) 1,200.0 1,000.0 800.0 600.0 400.0 200.0 0.0 8.0 7.0 6.0 5.0 4.0 3.0 2.0 1.0 0.0 Revenue ($ Million) Growth Rate (%) 2011 2012 2013 2014 2015 2016 2017 770.6 824.7 891.2 956.1 1027 1104.5 1189.4 7.0 7.0 8.1 7.3 7.4 7.5 7.7 Source: Frost & Sullivan
  • 5. An Overview and Competitive Analysis of the One-Time Password (OTP) Market 5Frost.com OTP market revenue is driven by hardware and the USBToken market. This source of revenue generates 83.7% of the total OTP market. The dominance of these revenue sources is not a surprise, as these solutions are adopted by a significant proportion of companies. This type of additional security measure has prompted rapid development of OTP solutions to deliver a cost-effective solution to corporate clients. Verticals such as physical and logical access, online payment or online gaming are the main areas of development. But the wide distribution of smartphones and tablets, coupled with new usage cases such as BYOD, are further boosting demand for OTP solutions. Both enterprises and financial institutions will be motivated to invest in hardware OTP solutions, even if the software OTP market continues to be attractive. It generated 16.3% of revenue for the total OTP market. Market Drivers As the volume of threats and the variety of breaches continue to grow, security protection is a constant battle for companies. This year, a higher level of scale was reached when the US government reported that more than 94 million records (containing personal information) have been exposed since 2009 in the US alone. Nearly 81 million of these were due to the loss or theft of mobile devices. High-profile instances involving major companies have also emerged. For example, Yahoo! was attacked in July 2012, with a reported 400,000 plain- text passwords stolen. Apple also revealed that a million Apple Unique Device Identifiers (UDIDs) were hacked in September 2012. The proliferation of identity theft and data breaches is the result of single-factor methods of authentication or weak passwords. Figure 3 describes the most influential market drivers that increase demand for OTP solutions. Figure 3–Total OTP Market: Key Market Drivers (Global), 2013-2018 MarketDrivers H H H H H H H M MM H H MMH Compliance with legislations, regulations and standards Need for two-factor authentication Security cost rationalization Proliferation of Identity theft and data breaches BYOD and cloud applications promote OTP adoption 1-2 years 3-4 years 5 years Source: Frost & Sullivan • Compliance with legislations, regulations and standards: With the recent controversy information regarding NSA activity and the PRISM program, citizens will probably be less reluctant to use strong authentication methods to access the network or their personal data. With data security as a current major focus point, compliance regulations and legislation continue to push organizations to use technology that will effectively ensure the proper handling of sensitive data. This is particularly true for payment and financial purposes with the Federal Financial Institutions Examination Council (FFIEC) and the Payment Card Industry Data Security Standard (PCI-DSS), but is also
  • 6. Frost & Sullivan 6 Frost.com needed to protect health data following the Health InformationTechnology for Economic and Clinical Health (HITECH) act. The emergence of governmental online services such as tax declaration has compelled OTP solution providers to adhere to Identification- Authentication-Signature European Citizen Card (IAS-ECC) in Europe. • Need for two-factor authentication: This authentication method is now the most popular globally and could drastically reduce the incidence of online security breaches. As the name suggests, this solution provides two means of identification: something that the user has (token) and something that the user knows (PIN). This is a minimum requirement for network access or digital identification. Some industries are already looking to stronger authentication methods,such as three-factor authentication,by adding biometric data. • Security cost rationalization: Overcoming legacy hardware token authentication is a challenge for many organizations. Whether it be changing OTP providers or switching to software-based authentication solutions, a change requires IT decision-makers to be open-minded. With further education, decision-makers have come to understand the benefits of software-based authentication and the use of more than a single form factor. OTP vendors are working to change the perception of complex deployments by developing platforms that promote interoperability and multiple forms of two-factor authentication. The multiple network security breaches of 2012 that affected entities such as LinkedIn, Nationwide Insurance and Apple have proven that any organization can be a target, or susceptible to either a highly sophisticated attack or a small vulnerability in an application. • Proliferation of identity theft and data breaches: 2012 was the year of data breach proliferation, not only due to the increasing number of attacks, but also by the emergence of large-scale data breaches. As the total number of Internet/mobile connections and online payments has drastically increased, so has the total number of identity thefts and data breaches. Identity theft gives a really negative influence to the market when it impacts bank accounts security. This influence is lower when it comes from social media accounts security. The emergence of mobile and online payment solutions created a specific need to protect data and deliver enhanced security. The lack of international rules for data protection allows the OTP solution to be seen as a trustable service by providing an easy- to-install security solution. • BYOD and cloud applications promote OTP adoption: The explosion of smartphones and tablets has changed the way people use professional and personal communication devices. The use of professional tablets is minor compared to consumer tablets. Indeed, globally, the average percentage of professional tablets shipped will be 0.8% (2012-2017) when in the same time consumer tablets will reach 92.9% (2012-2017) and E-Readers 6.3% (2012-2017). Finally, Mobile Device Management (MDM), Identity Access Management (IAM) and even NFC payment are moving into the cloud. This trend is the perfect answer to accelerate adoption of services and to decrease total investment costs. However, the security of the cloud should be aligned to company policies. OTP, in that case, is an accurate answer. The solution is accessible at any time, from any device, and anywhere.
  • 7. An Overview and Competitive Analysis of the One-Time Password (OTP) Market 7Frost.com COMPETITIVE ANALYSIS The security industry is evolving rapidly in response to the explosion of mobile devices and the emergence of new usages such as mobile payment and remote access. Only simple solutions coupled with minimal investment will survive in this competitive landscape.The need to have an authentication solution that is easy to use and that can allow a Single Sign On (SSO) element is crucial. But an optimized, secured solution should also reach a high level of security by providing reliable and strong authentication. OTP authentication vendors have understood these market constraints and provided a broad range of authentication solutions in 2012. Competitive positioning within the global 2012 OTP market is shown in Figure 4. In 2012, RSA confirmed its leadership position with a broad product portfolio and large choice of form factors. Figure 4–Total OTP Market Competitor Positioning Analysis (Global), 2012 Market PenetrationMarket Contenders Market Challengers Market Leader AbilitytoDeliver Gemalto Entrust RSA SymantecActivIdentity VASCO Data Security SafeNet Kobil Source: Frost & Sullivan RSA,the Security Division of EMC RSA has developed a popular set of solutions for authentication. For the enterprise market, the firm is seen as the most secure partner for two-factor authentication. For many years, RSA has created a complete two-factor authentication product portfolio. These solutions can be coupled with RSA’s authentication manager in order to centralize all security tokens and user profiles.
  • 8. Frost & Sullivan 8 Frost.com As shown in Figure 5, RSA led the market with 45.1% revenue share within the global OTP market in 2012. Figure 5–Total OTP Market Percent of Revenue (Global), 2012 RSA 45.1% Competitor 1 18.9% Competitor 2 11.7% Competitor 3 8.8% Competitor 4 4.8% Competitor 5 3.5% Competitor 6 2.1% Competitor 7 2.0% Others 3.0% Source: Frost & Sullivan Today, a static security solution is insufficient,and the need for a real-time and dynamic security solution is clear. Much like banks and financial institutions that are using risk management to optimize payment security levels, RSA has decided to use risk management to enhance its authentication services to better answer specific security requirements. Key Performance Drivers for RSA Wide Range of Innovative Products With more than 30 years of experience in the authentication business, RSA has built a solid reputation of reliable authentication solutions by using the latest security standards and strong cryptography mechanisms. Most of these technologies are patented, and as such, guarantee a strong market footprint. Authenticators could be used for authentication management, but also to encipher and protect hard disks or to generate digital signature for emails or during data transactions. Personalized and Best-in-Class Solutions RSA designed its business strategy by employing a customer-centric approach. Multiple form factors and options (such as authentication manager) are available. For an enterprise or an individual, a customized solution is crucial,as long as it is coupled with a reliable token. RSA has developed convenient products that are aligned with client expectations. Consequently, SMBs are able to find secure solutions to protect their network access. SMBs that were reluctant to deploy authentication solutions because of the high investment cost can now use cost- effective, risk-based and on-demand authentication systems.
  • 9. An Overview and Competitive Analysis of the One-Time Password (OTP) Market 9Frost.com Flexibility RSA has designed all of its products in order to facilitate final integration with a minimum of time and money. RSA solutions can be easily installed with more than 400 partner solutions used for network access,VPN or firewall. This strategy offers true benefit, as RSA product deployment does not need specific project or long-term investment. RSA’s OTP products are designed to be compatible with all major physical software platforms or virtual ones such as VMware. The architecture of the solution grants replication and evolution of the entire system. As a result, RSA’s products offer flexibility and control over total investment. CONCLUSION The OTP market is evolving from the hardware form factor to solutions answering the need for mobility and flexibility. The shift to more mobile-centric demand is driven by the widespread adoption of mobile devices and mobile payment/banking solutions. Enterprises are looking for specific security solutions in order to avoid data breaches and identity theft. At the same time, new requirements have emerged such as email encryption, digital signature and mobile access. Most OTP vendors have evolved their traditional product portfolio to better answer the changing needs of end users. As a result, the software OTP market is growing and many OTP vendors are providing specific credentials for NFC or Bluetooth purposes. OTP is moving to software-based solutions to leverage mobile devices as trustable identity providers.
  • 10. 877.GoFrost • myfrost@frost.com http://www.frost.com About Frost & Sullivan Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today’s market participants.For more than 50 years,we have been developing growth strategies for the Global 1000,emerging businesses, the public sector and the investment community. Is your organization prepared for the next profound wave of industry convergence, disruptive technologies, increasing competitive intensity, Mega Trends, breakthrough best practices, changing customer dynamics and emerging economies? Contact Us: Start the Discussion For information regarding permission, write: Frost & Sullivan 331 E. Evelyn Ave. Suite 100 MountainView, CA 94041 SiliconValley 331 E. Evelyn Ave. Suite 100 MountainView, CA 94041 Tel 650.475.4500 Fax 650.475.1570 San Antonio 7550 West Interstate 10, Suite 400, San Antonio,Texas 78229-5616 Tel 210.348.1000 Fax 210.348.1003 London 4 Grosvenor Gardens London SW1W 0DH Tel +44 (0)20 7343 8383 Fax +44 (0)20 7730 3343 Auckland Bahrain Bangkok Beijing Bengaluru Bogotá Buenos Aires Cape Town Chennai Colombo Delhi / NCR Detroit Dubai Frankfurt Iskander Malaysia/Johor Bahru Istanbul Jakarta Kolkata Kuala Lumpur London Manhattan Mexico City Miami Milan Mumbai Moscow Oxford Paris Pune Rockville Centre San Antonio São Paulo Seoul Shanghai Shenzhen SiliconValley Singapore Sophia Antipolis Sydney Taipei Tel Aviv Tokyo Toronto Warsaw Washington, DC