Skip to main content

Mobile Authentication Software Demand is Growing

Along with the increasing reports of IT security breaches comes the growing concern that traditional methods of managing access to devices and systems is inadequate. Therefore, we'll see more organizations seek ways to improve the technologies and methods that are being applied in their environment.

Mobile devices are particularly viewed as being vulnerable to unauthorized use, because they can more easily be lost or stolen. According to the latest market study by ABI Research, the global mobile multi-factor authentication software and service market will be worth $1.6 billion by the end of 2015.

Username and passwords have been widely used to authenticate user identity but fail to provide adequate authentication. The growth in authentication-based attacks continue to plague organizations of all sizes, with the majority of breaches being attributed to weak or absent authentication.

This situation has created significant market demand for mobile user authentication technologies that can be used to provide additional factor of authentication thus adding an extra layer of security.

One-time-passwords (OTPs) and tokens have emerged as the preferred choice of authentication as they offer greater security because the password they generate is only valid for a single session or transaction.

Digital certificates based on the concept of public/private key cryptography are also an effective authentication mechanism. Public key techniques have been adopted in many areas of information technology -- including network security, operating systems security, application data security, and digital rights management (DRM).

ABI Research calculates that the global managed mobile PKI software and service market will be worth $74 million by the end of 2015.

Many financial enterprises and other organizations including Google, Facebook, Microsoft, Twitter, and Apple are already using two-factor authentication (2FA). One form of two-factor authentication requires hardware-based security tokens.

"In the recent years hard tokens have been increasingly replaced by their software counterparts (soft tokens) which use either a smartphone app or the phone itself to supply a secret code for authentication," said Monolina Sen, senior analyst at ABI Research.

Other methods used to provide the second authentication factor include smart cards, security certificates, OTPs, and biometric scanning. ABI believes that a comprehensive solution will allow organizations to effectively enforce the appropriate method of authentication across applications, endpoints, and environments without burdening end users.

Popular posts from this blog

How Data and Analytics Drive Business Growth

Senior executives in the world’s largest and most complex organizations will develop the insights required to achieve lasting Digital Transformation. Gartner has identified a model for digital business growth that binds together data, analytics, technology, and forward-looking transformation capabilities. The Gartner Research Board said that data and analytics (D&A) leaders are uniquely positioned to drive this strategic organizational change that will make their companies behave like 'digital native' leaders.  "The most advanced and successful D&A leaders are driving new opportunities to use digital capabilities – often data and analytics products – to capture value. Those opportunities should directly connect to the business priorities," said Mario Faria, vice president at Gartner . Digital Business Market Development At the same time, some leaders are using digital and D&A to create whole new business models. These leaders – which Gartner named the CxO

Anywhere, Anytime Workplace Demand for SASE

The ongoing adoption of flexible working models within the enterprise market has significant implications for typical IT organizations that must now support knowledge workers and front-line employees that operate outside the corporate network perimeter. The global COVID-19 pandemic created IT networking and security challenges. The expansion of the distributed workforce, an increasing reliance on cloud computing infrastructure, and the requirement to securely connect online employees -- wherever they choose to work, at any given moment in time. Legacy IT solutions that have rigid network underlays and a requirement for on-premises infrastructure cannot adequately deal with these trends. This 'Anywhere, Anytime Workplace' led to demand for new Secure Access Service Edge (SASE) solutions, with networking and security delivered as-a-service. Anywhere, Anytime Workplace Market Development   Although converging networking and security capabilities offer enterprises a promising solut

The Metaverse Raised Virtual Reality Interest

After years of slow growth and limited use cases, the Virtual Reality (VR) market is now forecast to grow significantly over the next five years. Consumer interest in VR games and media continues to grow after the COVID-19 pandemic accelerated activity. At the same time, the need for employee enablement and immersive content within the enterprise environment remains strong. According to the latest market study by ABI Research, over 90 million Head Mounted Display (HMD) shipments in 2027 will drive total VR market revenues to reach over $95 billion across hardware, software, and services. Virtual Reality Market Development "The virtual reality market is no stranger to false starts, with identifiable efforts in VR dating back to the 1980s and 1990s. While the technology never found purchase results, the increased capability of VR hardware combined with the demand for immersive content in numerous markets, presents a significant opportunity," says Eric Abbruzzese, research direc