SlideShare a Scribd company logo
50 Years of Growth, Innovation and Leadership
A Frost & Sullivan
Executive Summary
Jean-Noël Georges
Program Director
www.frost.com
An Overview and Competitive Analysis
of the One-Time Password (OTP) Market
Frost & Sullivan
CONTENTS
Introduction.............................................................................................................................	3
OTP Market Landscape..........................................................................................................	4
Market Drivers......................................................................................................................	 5
Competitive Analysis..............................................................................................................	7
RSA, the Security Division of EMC.......................................................................................	 7
Key Performance Drivers for RSA.........................................................................................	8
Conclusion...............................................................................................................................	9
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
3Frost.com
INTRODUCTION
Over the past year,data breaches have impacted organizations of all types and sizes; from large
organizations to small businesses or governmental agencies, nobody is immune. As a result,
firms continue to invest in—and prioritize—information security.From an industry perspective,
variations are evident. For example, while the financial services, IT and government sectors
emphasize security strategy as a high priority, entertainment and travel companies invest less
in this area.
With the explosion of smartphone adoption, the number of people making purchases via
a mobile device has increased significantly. As eCommerce became mCommerce, payment
security became an area of considerable focus. During a “card not present” payment process,
a personal account number (PAN), expiration date, and card validation code (CVC) are not
enough to completely secure the transaction. However, new mechanisms such as 3D Secure
appear to increase the confidence of both consumers and eMerchants.
However, protecting a mobile device itself is necessary to ensure that only the owner is able
to use it. Although a simple mechanism such as a personal identification number (PIN) can
perform this task, in 2011, more than 60% of smartphone users were not using a PIN to
protect their mobile device.
Traditional password protection is not enough. Statistically speaking, well-known passwords
such as “1234”, “password” or “love” allow hackers to access personal data in 20% of the
cases. If this hacking strategy is coupled with a range of tools to obtain personal data (written
piece of software, keylogger, etc.) the chance to break the password could reach 55%.
In order to decrease the number of security breaches due to phishing, keyboard logging,
man-in-the-middle attacks or other methods, companies are integrating mobile OTP
(one-time password), OTP tokens and USB tokens. The OTP solution adds another level of
security protection as the use of a temporary password strongly protects network access and
end users.
Frost & Sullivan
4 Frost.com
Figure 1–Total OTP Market:Vertical Market Analysis, Global, 2012
Others
2.0%
Finance
38.0%
Government
27.0%
Healthcare
15.0%
Tech/Telcom
10.0%
Manufacturing
8.0%
Source: Frost & Sullivan
OTP MARKET LANDSCAPE
Due to the widespread adoption of the Internet and wireless devices,there is a specific need to
fully secure digital home networks and associated services.The emergence of mobile payments
(online payment by using website platform or specific application) has increased this security
need. Strong authentication solutions improve the security level by incorporating another
security measure to overcome the weaknesses and limitations of static passwords.
As shown in Figure 2, the global OTP market is growing at a compound annual growth rate
(CAGR) of 7.5%. In 2012, the market was valued at $824.7 million and is projected to grow to
$1.189 billion by 2017.
Figure 2–Total OTP Market: Revenue Forecast (Global), 2011-2017
Total OTP Market: Revenue Forecast Global, 2011-2017
Revenue CAGR, 2012-2017 = 7.5%
Revenue($Million)
GrowthRate(%)
1,200.0
1,000.0
800.0
600.0
400.0
200.0
0.0
8.0
7.0
6.0
5.0
4.0
3.0
2.0
1.0
0.0
Revenue ($ Million)
Growth Rate (%)
2011 2012 2013 2014 2015 2016 2017
770.6 824.7 891.2 956.1 1027 1104.5 1189.4
7.0 7.0 8.1 7.3 7.4 7.5 7.7
Source: Frost & Sullivan
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
5Frost.com
OTP market revenue is driven by hardware and the USBToken market. This source of revenue
generates 83.7% of the total OTP market. The dominance of these revenue sources is not a
surprise, as these solutions are adopted by a significant proportion of companies. This type of
additional security measure has prompted rapid development of OTP solutions to deliver a
cost-effective solution to corporate clients. Verticals such as physical and logical access, online
payment or online gaming are the main areas of development. But the wide distribution of
smartphones and tablets, coupled with new usage cases such as BYOD, are further boosting
demand for OTP solutions. Both enterprises and financial institutions will be motivated to
invest in hardware OTP solutions, even if the software OTP market continues to be attractive.
It generated 16.3% of revenue for the total OTP market.
Market Drivers
As the volume of threats and the variety of breaches continue to grow, security protection
is a constant battle for companies. This year, a higher level of scale was reached when the US
government reported that more than 94 million records (containing personal information)
have been exposed since 2009 in the US alone. Nearly 81 million of these were due to the
loss or theft of mobile devices. High-profile instances involving major companies have also
emerged. For example, Yahoo! was attacked in July 2012, with a reported 400,000 plain-
text passwords stolen. Apple also revealed that a million Apple Unique Device Identifiers
(UDIDs) were hacked in September 2012. The proliferation of identity theft and data breaches
is the result of single-factor methods of authentication or weak passwords. Figure 3 describes
the most influential market drivers that increase demand for OTP solutions.
Figure 3–Total OTP Market: Key Market Drivers (Global), 2013-2018
MarketDrivers
H
H
H
H
H
H
H
M
MM
H
H
MMH
Compliance with legislations, regulations and standards
Need for two-factor authentication
Security cost rationalization
Proliferation of Identity theft and data breaches
BYOD and cloud applications promote OTP adoption
1-2 years 3-4 years 5 years
Source: Frost & Sullivan
•	 Compliance with legislations, regulations and standards: With the recent
controversy information regarding NSA activity and the PRISM program, citizens will
probably be less reluctant to use strong authentication methods to access the network
or their personal data. With data security as a current major focus point, compliance
regulations and legislation continue to push organizations to use technology that
will effectively ensure the proper handling of sensitive data. This is particularly true for
payment and financial purposes with the Federal Financial Institutions Examination Council
(FFIEC) and the Payment Card Industry Data Security Standard (PCI-DSS), but is also
Frost & Sullivan
6 Frost.com
needed to protect health data following the Health InformationTechnology for Economic
and Clinical Health (HITECH) act. The emergence of governmental online services such
as tax declaration has compelled OTP solution providers to adhere to Identification-
Authentication-Signature European Citizen Card (IAS-ECC) in Europe.
•	 Need for two-factor authentication: This authentication method is now the most
popular globally and could drastically reduce the incidence of online security breaches.
As the name suggests, this solution provides two means of identification: something
that the user has (token) and something that the user knows (PIN). This is a minimum
requirement for network access or digital identification. Some industries are already
looking to stronger authentication methods,such as three-factor authentication,by adding
biometric data.
•	 Security cost rationalization: Overcoming legacy hardware token authentication is
a challenge for many organizations. Whether it be changing OTP providers or switching
to software-based authentication solutions, a change requires IT decision-makers to be
open-minded. With further education, decision-makers have come to understand the
benefits of software-based authentication and the use of more than a single form factor.
OTP vendors are working to change the perception of complex deployments by developing
platforms that promote interoperability and multiple forms of two-factor authentication.
The multiple network security breaches of 2012 that affected entities such as LinkedIn,
Nationwide Insurance and Apple have proven that any organization can be a target, or
susceptible to either a highly sophisticated attack or a small vulnerability in an application.
•	 Proliferation of identity theft and data breaches: 2012 was the year of data breach
proliferation, not only due to the increasing number of attacks, but also by the emergence
of large-scale data breaches. As the total number of Internet/mobile connections and
online payments has drastically increased, so has the total number of identity thefts and
data breaches. Identity theft gives a really negative influence to the market when it impacts
bank accounts security. This influence is lower when it comes from social media accounts
security. The emergence of mobile and online payment solutions created a specific need
to protect data and deliver enhanced security. The lack of international rules for data
protection allows the OTP solution to be seen as a trustable service by providing an easy-
to-install security solution.
•	 BYOD and cloud applications promote OTP adoption: The explosion of
smartphones and tablets has changed the way people use professional and personal
communication devices. The use of professional tablets is minor compared to consumer
tablets. Indeed, globally, the average percentage of professional tablets shipped will be
0.8% (2012-2017) when in the same time consumer tablets will reach 92.9% (2012-2017)
and E-Readers 6.3% (2012-2017). Finally, Mobile Device Management (MDM), Identity
Access Management (IAM) and even NFC payment are moving into the cloud. This trend
is the perfect answer to accelerate adoption of services and to decrease total investment
costs. However, the security of the cloud should be aligned to company policies. OTP,
in that case, is an accurate answer. The solution is accessible at any time, from any device,
and anywhere.
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
7Frost.com
COMPETITIVE ANALYSIS
The security industry is evolving rapidly in response to the explosion of mobile devices and the
emergence of new usages such as mobile payment and remote access. Only simple solutions
coupled with minimal investment will survive in this competitive landscape.The need to have
an authentication solution that is easy to use and that can allow a Single Sign On (SSO) element
is crucial. But an optimized, secured solution should also reach a high level of security by
providing reliable and strong authentication. OTP authentication vendors have understood
these market constraints and provided a broad range of authentication solutions in 2012.
Competitive positioning within the global 2012 OTP market is shown in Figure 4. In 2012,
RSA confirmed its leadership position with a broad product portfolio and large choice of
form factors.
Figure 4–Total OTP Market Competitor Positioning Analysis (Global), 2012
Market PenetrationMarket Contenders Market Challengers Market Leader
AbilitytoDeliver
Gemalto
Entrust
RSA
SymantecActivIdentity
VASCO
Data Security
SafeNet
Kobil
Source: Frost & Sullivan
RSA,the Security Division of EMC
RSA has developed a popular set of solutions for authentication. For the enterprise market,
the firm is seen as the most secure partner for two-factor authentication. For many years,
RSA has created a complete two-factor authentication product portfolio. These solutions can
be coupled with RSA’s authentication manager in order to centralize all security tokens and
user profiles.
Frost & Sullivan
8 Frost.com
As shown in Figure 5, RSA led the market with 45.1% revenue share within the global OTP
market in 2012.
Figure 5–Total OTP Market Percent of Revenue (Global), 2012
RSA
45.1%
Competitor 1
18.9%
Competitor 2
11.7%
Competitor 3
8.8%
Competitor 4
4.8%
Competitor 5
3.5%
Competitor 6
2.1% Competitor 7
2.0%
Others
3.0%
Source: Frost & Sullivan
Today, a static security solution is insufficient,and the need for a real-time and dynamic security
solution is clear. Much like banks and financial institutions that are using risk management to
optimize payment security levels, RSA has decided to use risk management to enhance its
authentication services to better answer specific security requirements.
Key Performance Drivers for RSA
Wide Range of Innovative Products
With more than 30 years of experience in the authentication business, RSA has built a solid
reputation of reliable authentication solutions by using the latest security standards and strong
cryptography mechanisms. Most of these technologies are patented, and as such, guarantee a
strong market footprint. Authenticators could be used for authentication management, but
also to encipher and protect hard disks or to generate digital signature for emails or during
data transactions.
Personalized and Best-in-Class Solutions
RSA designed its business strategy by employing a customer-centric approach. Multiple form
factors and options (such as authentication manager) are available. For an enterprise or an
individual, a customized solution is crucial,as long as it is coupled with a reliable token. RSA has
developed convenient products that are aligned with client expectations. Consequently, SMBs
are able to find secure solutions to protect their network access. SMBs that were reluctant
to deploy authentication solutions because of the high investment cost can now use cost-
effective, risk-based and on-demand authentication systems.
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
9Frost.com
Flexibility
RSA has designed all of its products in order to facilitate final integration with a minimum of
time and money. RSA solutions can be easily installed with more than 400 partner solutions
used for network access,VPN or firewall. This strategy offers true benefit, as RSA product
deployment does not need specific project or long-term investment. RSA’s OTP products are
designed to be compatible with all major physical software platforms or virtual ones such as
VMware. The architecture of the solution grants replication and evolution of the entire system.
As a result, RSA’s products offer flexibility and control over total investment.
CONCLUSION
The OTP market is evolving from the hardware form factor to solutions answering the
need for mobility and flexibility. The shift to more mobile-centric demand is driven by the
widespread adoption of mobile devices and mobile payment/banking solutions. Enterprises are
looking for specific security solutions in order to avoid data breaches and identity theft. At
the same time, new requirements have emerged such as email encryption, digital signature and
mobile access. Most OTP vendors have evolved their traditional product portfolio to better
answer the changing needs of end users. As a result, the software OTP market is growing and
many OTP vendors are providing specific credentials for NFC or Bluetooth purposes. OTP is
moving to software-based solutions to leverage mobile devices as trustable identity providers.
877.GoFrost • myfrost@frost.com
http://www.frost.com
About Frost & Sullivan
Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary
innovation that addresses the global challenges and related growth opportunities that will make or break today’s
market participants.For more than 50 years,we have been developing growth strategies for the Global 1000,emerging
businesses, the public sector and the investment community. Is your organization prepared for the next profound
wave of industry convergence, disruptive technologies, increasing competitive intensity, Mega Trends, breakthrough
best practices, changing customer dynamics and emerging economies? Contact Us: Start the Discussion
For information regarding permission, write:
Frost & Sullivan
331 E. Evelyn Ave. Suite 100
MountainView, CA 94041
SiliconValley
331 E. Evelyn Ave. Suite 100
MountainView, CA 94041
Tel 650.475.4500
Fax 650.475.1570
San Antonio
7550 West Interstate 10, Suite 400,
San Antonio,Texas 78229-5616
Tel 210.348.1000
Fax 210.348.1003
London
4 Grosvenor Gardens
London SW1W 0DH
Tel +44 (0)20 7343 8383
Fax +44 (0)20 7730 3343
Auckland
Bahrain
Bangkok
Beijing
Bengaluru
Bogotá
Buenos Aires
Cape Town
Chennai
Colombo
Delhi / NCR
Detroit
Dubai
Frankfurt
Iskander Malaysia/Johor Bahru
Istanbul
Jakarta
Kolkata
Kuala Lumpur
London
Manhattan
Mexico City
Miami
Milan
Mumbai
Moscow
Oxford
Paris
Pune
Rockville Centre
San Antonio
São Paulo
Seoul
Shanghai
Shenzhen
SiliconValley
Singapore
Sophia Antipolis
Sydney
Taipei
Tel Aviv
Tokyo
Toronto
Warsaw
Washington, DC

More Related Content

What's hot

Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
Vipin Subhash
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
Bankir_Ru
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
IJSRED
 
Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017
Graeme Cross
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
Suresh Kesavan
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
- Mark - Fullbright
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Stanford GSB Corporate Governance Research Initiative
 
Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...
Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...
Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...
yStats.com
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
- Mark - Fullbright
 
Market Research Report : Software Market in China 2012
Market Research Report :  Software Market in China 2012Market Research Report :  Software Market in China 2012
Market Research Report : Software Market in China 2012
Netscribes, Inc.
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
Capgemini
 
IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...
IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...
IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...
StatsCommunications
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
Echoworx
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015
TransUnion
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
PwC France
 
Data Fraud Analytics Industry
Data Fraud Analytics Industry Data Fraud Analytics Industry
Data Fraud Analytics Industry
Cole Secor
 
Red Flag Rules
Red Flag RulesRed Flag Rules
Red Flag Rules
- Mark - Fullbright
 

What's hot (17)

Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...
Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...
Sample Report: Middle East B2C E-Commerce and Payment Market 2020 and COVID-1...
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Market Research Report : Software Market in China 2012
Market Research Report :  Software Market in China 2012Market Research Report :  Software Market in China 2012
Market Research Report : Software Market in China 2012
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...
IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...
IAOS 2018 - A review on measuring digital trade and e-commerce as new economi...
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Data Fraud Analytics Industry
Data Fraud Analytics Industry Data Fraud Analytics Industry
Data Fraud Analytics Industry
 
Red Flag Rules
Red Flag RulesRed Flag Rules
Red Flag Rules
 

Viewers also liked

An RSA Type OTP Generator
An RSA Type OTP GeneratorAn RSA Type OTP Generator
An RSA Type OTP Generator
Aiswarya Vinayachandran
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
 
Mobile solutions strategy for a retail bank
Mobile solutions strategy for a retail bankMobile solutions strategy for a retail bank
Mobile solutions strategy for a retail bank
Alexey Kazakov
 
One Time Password - A two factor authentication system
One Time Password  - A two factor authentication systemOne Time Password  - A two factor authentication system
One Time Password - A two factor authentication system
Swetha Kogatam
 
One Time Password
One Time PasswordOne Time Password
One Time Password
mahdi ataeyan
 
One time password(otp)
One time password(otp)One time password(otp)
One time password(otp)
Anjali Agrawal
 
Dossier Del Centro Cordoba
Dossier Del Centro CordobaDossier Del Centro Cordoba
Dossier Del Centro Cordobacarlos a
 
Constancias de confinación
Constancias de confinaciónConstancias de confinación
Constancias de confinaciónBraulio Angulo
 
15.03.02 Seminole Stiles RGD letter
15.03.02 Seminole Stiles RGD letter15.03.02 Seminole Stiles RGD letter
15.03.02 Seminole Stiles RGD letterMichael McDermott
 
Creative Concepts General Presentation
Creative Concepts General PresentationCreative Concepts General Presentation
Creative Concepts General PresentationSocial Media Dokters
 
Andi Agrosoaie
Andi AgrosoaieAndi Agrosoaie
Andi Agrosoaie
Estima Medical Group
 
Us patent cases weekly update march 10th march 17th 2015
Us patent cases weekly update  march 10th march 17th 2015Us patent cases weekly update  march 10th march 17th 2015
Us patent cases weekly update march 10th march 17th 2015InvnTree IP Services Pvt. Ltd.
 
Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...
Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...
Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...
Esade Creapolis
 
Landbote Social Media Factsheets (alle)
Landbote Social Media Factsheets (alle)Landbote Social Media Factsheets (alle)
Landbote Social Media Factsheets (alle)
Hofrat Suess AG
 
Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...
Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...
Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...
Sogepsa
 
Vijnos e
Vijnos eVijnos e
Vijnos e
J SL
 

Viewers also liked (19)

An RSA Type OTP Generator
An RSA Type OTP GeneratorAn RSA Type OTP Generator
An RSA Type OTP Generator
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
Mobile solutions strategy for a retail bank
Mobile solutions strategy for a retail bankMobile solutions strategy for a retail bank
Mobile solutions strategy for a retail bank
 
One Time Password - A two factor authentication system
One Time Password  - A two factor authentication systemOne Time Password  - A two factor authentication system
One Time Password - A two factor authentication system
 
One Time Password
One Time PasswordOne Time Password
One Time Password
 
One time password(otp)
One time password(otp)One time password(otp)
One time password(otp)
 
CEI PRAISE - Framework Programme
CEI PRAISE - Framework Programme CEI PRAISE - Framework Programme
CEI PRAISE - Framework Programme
 
Dossier Del Centro Cordoba
Dossier Del Centro CordobaDossier Del Centro Cordoba
Dossier Del Centro Cordoba
 
Llatinismes Aforismes
Llatinismes AforismesLlatinismes Aforismes
Llatinismes Aforismes
 
Constancias de confinación
Constancias de confinaciónConstancias de confinación
Constancias de confinación
 
15.03.02 Seminole Stiles RGD letter
15.03.02 Seminole Stiles RGD letter15.03.02 Seminole Stiles RGD letter
15.03.02 Seminole Stiles RGD letter
 
Creative Concepts General Presentation
Creative Concepts General PresentationCreative Concepts General Presentation
Creative Concepts General Presentation
 
Andi Agrosoaie
Andi AgrosoaieAndi Agrosoaie
Andi Agrosoaie
 
Us patent cases weekly update march 10th march 17th 2015
Us patent cases weekly update  march 10th march 17th 2015Us patent cases weekly update  march 10th march 17th 2015
Us patent cases weekly update march 10th march 17th 2015
 
Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...
Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...
Montserrat Sanahuja/Juan Miguel Cervantes - OptiProgram: Fidelización y sopor...
 
Landbote Social Media Factsheets (alle)
Landbote Social Media Factsheets (alle)Landbote Social Media Factsheets (alle)
Landbote Social Media Factsheets (alle)
 
ztevan mary
ztevan maryztevan mary
ztevan mary
 
Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...
Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...
Parcelas a la venta en el Parque Empresarial de Barres, Castropol, Occidente ...
 
Vijnos e
Vijnos eVijnos e
Vijnos e
 

Similar to An Overview and Competitive Analysis of the One-Time Password (OTP) Market

Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFAlexander Goodwin
 
Intrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docxIntrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docx
sonubot1
 
Buy Recommendation for Palo Alto Networks
Buy Recommendation for Palo Alto NetworksBuy Recommendation for Palo Alto Networks
Buy Recommendation for Palo Alto NetworksZsofia Szurovszki
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
Managing Mobile Menaces
Managing Mobile MenacesManaging Mobile Menaces
Managing Mobile Menaces
Nalneesh Gaur
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
Renub Research
 
Top online frauds 2010
Top online frauds 2010Top online frauds 2010
Top online frauds 2010
Cade Zvavanjanja
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
CompTIA
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
Entersoft Security
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
TBledsoe
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
Cognizant
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
EamonnORagh
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
mercatoradvisory
 
Payment Security Market by Product Type, Distribution Channel, End User 2024-...
Payment Security Market by Product Type, Distribution Channel, End User 2024-...Payment Security Market by Product Type, Distribution Channel, End User 2024-...
Payment Security Market by Product Type, Distribution Channel, End User 2024-...
IMARC Group
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
Omlis
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
Mert Akın
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
MuhammadArif823
 

Similar to An Overview and Competitive Analysis of the One-Time Password (OTP) Market (20)

Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDF
 
Intrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docxIntrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docx
 
Buy Recommendation for Palo Alto Networks
Buy Recommendation for Palo Alto NetworksBuy Recommendation for Palo Alto Networks
Buy Recommendation for Palo Alto Networks
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Managing Mobile Menaces
Managing Mobile MenacesManaging Mobile Menaces
Managing Mobile Menaces
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Top online frauds 2010
Top online frauds 2010Top online frauds 2010
Top online frauds 2010
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
Payment Security Market by Product Type, Distribution Channel, End User 2024-...
Payment Security Market by Product Type, Distribution Channel, End User 2024-...Payment Security Market by Product Type, Distribution Channel, End User 2024-...
Payment Security Market by Product Type, Distribution Channel, End User 2024-...
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
EMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
EMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
EMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
EMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
EMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
EMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
EMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
EMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
EMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
EMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

An Overview and Competitive Analysis of the One-Time Password (OTP) Market

  • 1. 50 Years of Growth, Innovation and Leadership A Frost & Sullivan Executive Summary Jean-Noël Georges Program Director www.frost.com An Overview and Competitive Analysis of the One-Time Password (OTP) Market
  • 2. Frost & Sullivan CONTENTS Introduction............................................................................................................................. 3 OTP Market Landscape.......................................................................................................... 4 Market Drivers...................................................................................................................... 5 Competitive Analysis.............................................................................................................. 7 RSA, the Security Division of EMC....................................................................................... 7 Key Performance Drivers for RSA......................................................................................... 8 Conclusion............................................................................................................................... 9
  • 3. An Overview and Competitive Analysis of the One-Time Password (OTP) Market 3Frost.com INTRODUCTION Over the past year,data breaches have impacted organizations of all types and sizes; from large organizations to small businesses or governmental agencies, nobody is immune. As a result, firms continue to invest in—and prioritize—information security.From an industry perspective, variations are evident. For example, while the financial services, IT and government sectors emphasize security strategy as a high priority, entertainment and travel companies invest less in this area. With the explosion of smartphone adoption, the number of people making purchases via a mobile device has increased significantly. As eCommerce became mCommerce, payment security became an area of considerable focus. During a “card not present” payment process, a personal account number (PAN), expiration date, and card validation code (CVC) are not enough to completely secure the transaction. However, new mechanisms such as 3D Secure appear to increase the confidence of both consumers and eMerchants. However, protecting a mobile device itself is necessary to ensure that only the owner is able to use it. Although a simple mechanism such as a personal identification number (PIN) can perform this task, in 2011, more than 60% of smartphone users were not using a PIN to protect their mobile device. Traditional password protection is not enough. Statistically speaking, well-known passwords such as “1234”, “password” or “love” allow hackers to access personal data in 20% of the cases. If this hacking strategy is coupled with a range of tools to obtain personal data (written piece of software, keylogger, etc.) the chance to break the password could reach 55%. In order to decrease the number of security breaches due to phishing, keyboard logging, man-in-the-middle attacks or other methods, companies are integrating mobile OTP (one-time password), OTP tokens and USB tokens. The OTP solution adds another level of security protection as the use of a temporary password strongly protects network access and end users.
  • 4. Frost & Sullivan 4 Frost.com Figure 1–Total OTP Market:Vertical Market Analysis, Global, 2012 Others 2.0% Finance 38.0% Government 27.0% Healthcare 15.0% Tech/Telcom 10.0% Manufacturing 8.0% Source: Frost & Sullivan OTP MARKET LANDSCAPE Due to the widespread adoption of the Internet and wireless devices,there is a specific need to fully secure digital home networks and associated services.The emergence of mobile payments (online payment by using website platform or specific application) has increased this security need. Strong authentication solutions improve the security level by incorporating another security measure to overcome the weaknesses and limitations of static passwords. As shown in Figure 2, the global OTP market is growing at a compound annual growth rate (CAGR) of 7.5%. In 2012, the market was valued at $824.7 million and is projected to grow to $1.189 billion by 2017. Figure 2–Total OTP Market: Revenue Forecast (Global), 2011-2017 Total OTP Market: Revenue Forecast Global, 2011-2017 Revenue CAGR, 2012-2017 = 7.5% Revenue($Million) GrowthRate(%) 1,200.0 1,000.0 800.0 600.0 400.0 200.0 0.0 8.0 7.0 6.0 5.0 4.0 3.0 2.0 1.0 0.0 Revenue ($ Million) Growth Rate (%) 2011 2012 2013 2014 2015 2016 2017 770.6 824.7 891.2 956.1 1027 1104.5 1189.4 7.0 7.0 8.1 7.3 7.4 7.5 7.7 Source: Frost & Sullivan
  • 5. An Overview and Competitive Analysis of the One-Time Password (OTP) Market 5Frost.com OTP market revenue is driven by hardware and the USBToken market. This source of revenue generates 83.7% of the total OTP market. The dominance of these revenue sources is not a surprise, as these solutions are adopted by a significant proportion of companies. This type of additional security measure has prompted rapid development of OTP solutions to deliver a cost-effective solution to corporate clients. Verticals such as physical and logical access, online payment or online gaming are the main areas of development. But the wide distribution of smartphones and tablets, coupled with new usage cases such as BYOD, are further boosting demand for OTP solutions. Both enterprises and financial institutions will be motivated to invest in hardware OTP solutions, even if the software OTP market continues to be attractive. It generated 16.3% of revenue for the total OTP market. Market Drivers As the volume of threats and the variety of breaches continue to grow, security protection is a constant battle for companies. This year, a higher level of scale was reached when the US government reported that more than 94 million records (containing personal information) have been exposed since 2009 in the US alone. Nearly 81 million of these were due to the loss or theft of mobile devices. High-profile instances involving major companies have also emerged. For example, Yahoo! was attacked in July 2012, with a reported 400,000 plain- text passwords stolen. Apple also revealed that a million Apple Unique Device Identifiers (UDIDs) were hacked in September 2012. The proliferation of identity theft and data breaches is the result of single-factor methods of authentication or weak passwords. Figure 3 describes the most influential market drivers that increase demand for OTP solutions. Figure 3–Total OTP Market: Key Market Drivers (Global), 2013-2018 MarketDrivers H H H H H H H M MM H H MMH Compliance with legislations, regulations and standards Need for two-factor authentication Security cost rationalization Proliferation of Identity theft and data breaches BYOD and cloud applications promote OTP adoption 1-2 years 3-4 years 5 years Source: Frost & Sullivan • Compliance with legislations, regulations and standards: With the recent controversy information regarding NSA activity and the PRISM program, citizens will probably be less reluctant to use strong authentication methods to access the network or their personal data. With data security as a current major focus point, compliance regulations and legislation continue to push organizations to use technology that will effectively ensure the proper handling of sensitive data. This is particularly true for payment and financial purposes with the Federal Financial Institutions Examination Council (FFIEC) and the Payment Card Industry Data Security Standard (PCI-DSS), but is also
  • 6. Frost & Sullivan 6 Frost.com needed to protect health data following the Health InformationTechnology for Economic and Clinical Health (HITECH) act. The emergence of governmental online services such as tax declaration has compelled OTP solution providers to adhere to Identification- Authentication-Signature European Citizen Card (IAS-ECC) in Europe. • Need for two-factor authentication: This authentication method is now the most popular globally and could drastically reduce the incidence of online security breaches. As the name suggests, this solution provides two means of identification: something that the user has (token) and something that the user knows (PIN). This is a minimum requirement for network access or digital identification. Some industries are already looking to stronger authentication methods,such as three-factor authentication,by adding biometric data. • Security cost rationalization: Overcoming legacy hardware token authentication is a challenge for many organizations. Whether it be changing OTP providers or switching to software-based authentication solutions, a change requires IT decision-makers to be open-minded. With further education, decision-makers have come to understand the benefits of software-based authentication and the use of more than a single form factor. OTP vendors are working to change the perception of complex deployments by developing platforms that promote interoperability and multiple forms of two-factor authentication. The multiple network security breaches of 2012 that affected entities such as LinkedIn, Nationwide Insurance and Apple have proven that any organization can be a target, or susceptible to either a highly sophisticated attack or a small vulnerability in an application. • Proliferation of identity theft and data breaches: 2012 was the year of data breach proliferation, not only due to the increasing number of attacks, but also by the emergence of large-scale data breaches. As the total number of Internet/mobile connections and online payments has drastically increased, so has the total number of identity thefts and data breaches. Identity theft gives a really negative influence to the market when it impacts bank accounts security. This influence is lower when it comes from social media accounts security. The emergence of mobile and online payment solutions created a specific need to protect data and deliver enhanced security. The lack of international rules for data protection allows the OTP solution to be seen as a trustable service by providing an easy- to-install security solution. • BYOD and cloud applications promote OTP adoption: The explosion of smartphones and tablets has changed the way people use professional and personal communication devices. The use of professional tablets is minor compared to consumer tablets. Indeed, globally, the average percentage of professional tablets shipped will be 0.8% (2012-2017) when in the same time consumer tablets will reach 92.9% (2012-2017) and E-Readers 6.3% (2012-2017). Finally, Mobile Device Management (MDM), Identity Access Management (IAM) and even NFC payment are moving into the cloud. This trend is the perfect answer to accelerate adoption of services and to decrease total investment costs. However, the security of the cloud should be aligned to company policies. OTP, in that case, is an accurate answer. The solution is accessible at any time, from any device, and anywhere.
  • 7. An Overview and Competitive Analysis of the One-Time Password (OTP) Market 7Frost.com COMPETITIVE ANALYSIS The security industry is evolving rapidly in response to the explosion of mobile devices and the emergence of new usages such as mobile payment and remote access. Only simple solutions coupled with minimal investment will survive in this competitive landscape.The need to have an authentication solution that is easy to use and that can allow a Single Sign On (SSO) element is crucial. But an optimized, secured solution should also reach a high level of security by providing reliable and strong authentication. OTP authentication vendors have understood these market constraints and provided a broad range of authentication solutions in 2012. Competitive positioning within the global 2012 OTP market is shown in Figure 4. In 2012, RSA confirmed its leadership position with a broad product portfolio and large choice of form factors. Figure 4–Total OTP Market Competitor Positioning Analysis (Global), 2012 Market PenetrationMarket Contenders Market Challengers Market Leader AbilitytoDeliver Gemalto Entrust RSA SymantecActivIdentity VASCO Data Security SafeNet Kobil Source: Frost & Sullivan RSA,the Security Division of EMC RSA has developed a popular set of solutions for authentication. For the enterprise market, the firm is seen as the most secure partner for two-factor authentication. For many years, RSA has created a complete two-factor authentication product portfolio. These solutions can be coupled with RSA’s authentication manager in order to centralize all security tokens and user profiles.
  • 8. Frost & Sullivan 8 Frost.com As shown in Figure 5, RSA led the market with 45.1% revenue share within the global OTP market in 2012. Figure 5–Total OTP Market Percent of Revenue (Global), 2012 RSA 45.1% Competitor 1 18.9% Competitor 2 11.7% Competitor 3 8.8% Competitor 4 4.8% Competitor 5 3.5% Competitor 6 2.1% Competitor 7 2.0% Others 3.0% Source: Frost & Sullivan Today, a static security solution is insufficient,and the need for a real-time and dynamic security solution is clear. Much like banks and financial institutions that are using risk management to optimize payment security levels, RSA has decided to use risk management to enhance its authentication services to better answer specific security requirements. Key Performance Drivers for RSA Wide Range of Innovative Products With more than 30 years of experience in the authentication business, RSA has built a solid reputation of reliable authentication solutions by using the latest security standards and strong cryptography mechanisms. Most of these technologies are patented, and as such, guarantee a strong market footprint. Authenticators could be used for authentication management, but also to encipher and protect hard disks or to generate digital signature for emails or during data transactions. Personalized and Best-in-Class Solutions RSA designed its business strategy by employing a customer-centric approach. Multiple form factors and options (such as authentication manager) are available. For an enterprise or an individual, a customized solution is crucial,as long as it is coupled with a reliable token. RSA has developed convenient products that are aligned with client expectations. Consequently, SMBs are able to find secure solutions to protect their network access. SMBs that were reluctant to deploy authentication solutions because of the high investment cost can now use cost- effective, risk-based and on-demand authentication systems.
  • 9. An Overview and Competitive Analysis of the One-Time Password (OTP) Market 9Frost.com Flexibility RSA has designed all of its products in order to facilitate final integration with a minimum of time and money. RSA solutions can be easily installed with more than 400 partner solutions used for network access,VPN or firewall. This strategy offers true benefit, as RSA product deployment does not need specific project or long-term investment. RSA’s OTP products are designed to be compatible with all major physical software platforms or virtual ones such as VMware. The architecture of the solution grants replication and evolution of the entire system. As a result, RSA’s products offer flexibility and control over total investment. CONCLUSION The OTP market is evolving from the hardware form factor to solutions answering the need for mobility and flexibility. The shift to more mobile-centric demand is driven by the widespread adoption of mobile devices and mobile payment/banking solutions. Enterprises are looking for specific security solutions in order to avoid data breaches and identity theft. At the same time, new requirements have emerged such as email encryption, digital signature and mobile access. Most OTP vendors have evolved their traditional product portfolio to better answer the changing needs of end users. As a result, the software OTP market is growing and many OTP vendors are providing specific credentials for NFC or Bluetooth purposes. OTP is moving to software-based solutions to leverage mobile devices as trustable identity providers.
  • 10. 877.GoFrost • myfrost@frost.com http://www.frost.com About Frost & Sullivan Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today’s market participants.For more than 50 years,we have been developing growth strategies for the Global 1000,emerging businesses, the public sector and the investment community. Is your organization prepared for the next profound wave of industry convergence, disruptive technologies, increasing competitive intensity, Mega Trends, breakthrough best practices, changing customer dynamics and emerging economies? Contact Us: Start the Discussion For information regarding permission, write: Frost & Sullivan 331 E. Evelyn Ave. Suite 100 MountainView, CA 94041 SiliconValley 331 E. Evelyn Ave. Suite 100 MountainView, CA 94041 Tel 650.475.4500 Fax 650.475.1570 San Antonio 7550 West Interstate 10, Suite 400, San Antonio,Texas 78229-5616 Tel 210.348.1000 Fax 210.348.1003 London 4 Grosvenor Gardens London SW1W 0DH Tel +44 (0)20 7343 8383 Fax +44 (0)20 7730 3343 Auckland Bahrain Bangkok Beijing Bengaluru Bogotá Buenos Aires Cape Town Chennai Colombo Delhi / NCR Detroit Dubai Frankfurt Iskander Malaysia/Johor Bahru Istanbul Jakarta Kolkata Kuala Lumpur London Manhattan Mexico City Miami Milan Mumbai Moscow Oxford Paris Pune Rockville Centre San Antonio São Paulo Seoul Shanghai Shenzhen SiliconValley Singapore Sophia Antipolis Sydney Taipei Tel Aviv Tokyo Toronto Warsaw Washington, DC