• SELECT SITE CURRENCY
Select a currency for use throughout the site
Analysis of the Global One-time Password Market
Frost & Sullivan, August 2012, Pages: 90
Emerging Threats Call for a Multi-layered Approach to Authentication
Advanced persistent threats, sophisticated malware, and data breaches have alerted the security industry and all organizations. Any organization, regardless of size and industry, can be targeted. Minimum security measures allow for criminals to investigate for vulnerabilities in a network whether it be through APTs and/or social engineering. Organizations must partner with security vendors to develop appropriate strategies to safeguard their digital resources. One-time password (OTP) tokens should be a part of that strategy. OTP tokens, analyzed in this research service, can be deployed as traditional hardware tokens, software tokens, and USB key tokens.
Regardless of size, the security industry and all organizations need to be aware of possible persistent threats, sophisticated malware, and data breaches. Minimum security measures and vulnerabilities in applications allow for criminals to investigate for vulnerabilities in a network, whether it be through advance persistent threats (APTs) and/or social engineering.
Organizations must partner with security vendors to develop appropriate strategies to safeguard their digital resources. One-time password (OTP) tokens should be a part of that strategy.
One-time password products include hardware tokens (i.e., key chain form factor), software tokens in the form of OTP applications, and universal serial bus (USB) keys. In 2011, the OTP market generated $ million, growing at a compound annual growth rate (CAGR) of percent through 2016.
The top drivers in this market are:
- Compliance mandates
- Escalating threat landscape
- Demand for versatile authentication systems
- Bring your own device (BYOD)
On the other hand, the market faces challenges with:
- Evolving or alternative authentication systems
- Total cost of deployment
- High profiled breaches on security vendors
Also, organizations are moving towards converting their hardware OTP tokens with software OTP tokens, due to their ease of access and ability to authenticate more than one device.
Executive Summary 4
Market Overview 10
Total OTP Market
- External Challenges: Drivers and Restraints 18
- Forecasts and Trends 28
-Market Share and Competitive Analysis 38
Hardware OTP Token Segment Breakdown 44
Software OTP Token Segment Breakdown 48
USB Key Token Segment Breakdown 52
The Last Word 56
A sample for this product is available. Please Login/Register to download this sample.