Skip to main content

Mobile Authentication Software Demand is Growing

Along with the increasing reports of IT security breaches comes the growing concern that traditional methods of managing access to devices and systems is inadequate. Therefore, we'll see more organizations seek ways to improve the technologies and methods that are being applied in their environment.

Mobile devices are particularly viewed as being vulnerable to unauthorized use, because they can more easily be lost or stolen. According to the latest market study by ABI Research, the global mobile multi-factor authentication software and service market will be worth $1.6 billion by the end of 2015.

Username and passwords have been widely used to authenticate user identity but fail to provide adequate authentication. The growth in authentication-based attacks continue to plague organizations of all sizes, with the majority of breaches being attributed to weak or absent authentication.

This situation has created significant market demand for mobile user authentication technologies that can be used to provide additional factor of authentication thus adding an extra layer of security.

One-time-passwords (OTPs) and tokens have emerged as the preferred choice of authentication as they offer greater security because the password they generate is only valid for a single session or transaction.

Digital certificates based on the concept of public/private key cryptography are also an effective authentication mechanism. Public key techniques have been adopted in many areas of information technology -- including network security, operating systems security, application data security, and digital rights management (DRM).

ABI Research calculates that the global managed mobile PKI software and service market will be worth $74 million by the end of 2015.

Many financial enterprises and other organizations including Google, Facebook, Microsoft, Twitter, and Apple are already using two-factor authentication (2FA). One form of two-factor authentication requires hardware-based security tokens.

"In the recent years hard tokens have been increasingly replaced by their software counterparts (soft tokens) which use either a smartphone app or the phone itself to supply a secret code for authentication," said Monolina Sen, senior analyst at ABI Research.

Other methods used to provide the second authentication factor include smart cards, security certificates, OTPs, and biometric scanning. ABI believes that a comprehensive solution will allow organizations to effectively enforce the appropriate method of authentication across applications, endpoints, and environments without burdening end users.

Popular posts from this blog

Climate Change Benefits from The Circular Economy

The COP26 Summit (in Glasgow, Scotland)  brought parties together to accelerate action towards the goals of the Paris Agreement and the UN Framework Convention on Climate Change. Meanwhile, the circular economy is a key sustainability strategy adopted by industry leaders in their efforts to achieve progress. While the circular economy is still in its infancy in terms of data and metrics, it's a growing phenomenon where technology sectors -- such as the Internet of Things (IoT) for asset tracking -- are set to grow rapidly within the next five years. Global technology intelligence firm ABI Research forecasts that the world will achieve over 10.5 percent circularity by 2030, as sustainability efforts and incoming legislation start to take effect. Circular Economy Tech Market Development "The circular economy is an often-misunderstood concept that goes much further than waste management and can become a blueprint for cities. It is a movement away from our take-make-waste economy

Business Technology for The Anywhere Workspace

The COVID-19 global pandemic fueled the trend of pushing executives outside of their comfort zone, while government-mandated lockdowns required their knowledge worker employees to work from home. Companies that previously avoided 'Flexible Working' models were forced to embrace the pervasive trend in a matter of weeks, as new remote working policies became a CHRO standard practice. As we enter 2022, more employers will empower their key employees to work wherever they desire and engage with customers whenever and however they prefer. Moreover, the ongoing transformation to an 'Anywhere Workspace' will drive strategic IT spending and advance cloud-based SaaS adoption. Business Technology Market Development Global enterprise IT spending is projected to total $4.5 trillion in 2022, an increase of 5.5 percent over 2021, according to the latest worldwide market study by Gartner. "Enterprises will increasingly build new technologies and software, rather than buy and imp

Top 10 Predictions for The Worldwide CIO

Chief executives are eager to accelerate a digital business growth agenda. Focused on business model reinvention, the remediation of technical debt, sustainable IT infrastructure and more, International Data Corporation (IDC) unveiled their Worldwide CIO Agenda 2022 Predictions. The key IDC predictions will likely impact CIOs and IT professionals over the next one-to-five years. IDC analysts believe IT leaders have opportunities that will not present themselves again in their lifetimes. Chief Information Officer Agenda Predictions With forward-looking insights, IDC provides senior IT leaders and Line-of-Business (LoB) executives with actionable guidance for managing IT investment priorities and implementation strategies as they continue to navigate the winds of change. The top ten IDC predictions are: 1: Through 2026, 65 percent of CIOs will sustain a cycle of tech-based empowerment, agility, and resilience through collaborative governance, new service delivery models, and a business o