About Phone-based Authentication The phone-factor is the second layer of two-factor or multi-factor authentication. Phone-based authentication is enabled through an end-user's cell phone or smartphone and provides an advanced level of authentication. The authentication process is done using passcodes, text messages, or phone calls. It is mainly used by banks and payment gateways to ensure confidentiality and to verify the authenticity of the user during monetary transactions. It is also being adopted by other sectors such as healthcare. It is a cost-effective method compared to hardware tokens for securing information. With advances in technology, several mobile network operators (MNOs) have introduced 2G, 3G, and 4G network services. This helps them improve their efficiency in sending OTP to customers for their online transactions and mobile banking. Thus, MNOs play an important role in the growth of the global phone-based authentication market. Technavio's analysts forecast the global phone-based authentication market to grow at a CAGR of 49.33% over the period 2014-2019. Covered in this Report This report covers the present scenario and the growth prospects... Research Beam Model: Research Beam Product ID: 250989 2500 USD New
Phone-based Authentication: Global Market Outlook and Forecast 2015-2019
 
 

Phone-based Authentication: Global Market Outlook and Forecast 2015-2019

  • Category : ICT & Media
  • Published On : July   2015
  • Pages : 82
  • Publisher : Technavio
 
 
 
About Phone-based Authentication

The phone-factor is the second layer of two-factor or multi-factor authentication. Phone-based authentication is enabled through an end-user's cell phone or smartphone and provides an advanced level of authentication. The authentication process is done using passcodes, text messages, or phone calls. It is mainly used by banks and payment gateways to ensure confidentiality and to verify the authenticity of the user during monetary transactions. It is also being adopted by other sectors such as healthcare. It is a cost-effective method compared to hardware tokens for securing information.

With advances in technology, several mobile network operators (MNOs) have introduced 2G, 3G, and 4G network services. This helps them improve their efficiency in sending OTP to customers for their online transactions and mobile banking. Thus, MNOs play an important role in the growth of the global phone-based authentication market.

Technavio's analysts forecast the global phone-based authentication market to grow at a CAGR of 49.33% over the period 2014-2019.

Covered in this Report

This report covers the present scenario and the growth prospects of the global phone-based authentication market for the period 2015-2019. To calculate the market size, the report considers the revenue generated from the sales of the phone-based authentication solutions.

The market is segmented on the basis of the following:

• Geography: Americas, EMEA, and APAC
• End-users: BFSI, PCI, government organizations, and others sectors

Technavio's report, Global Phone-based Authentication Market 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in this market.

Key Regions
• Americas
• APAC
• EMEA

Key Vendors
• CA Technologies
• EMC
• Gemalto
• Microsoft
• Symantec
• Technology Nexus
• VASCO

Other Prominent Vendors
• Deepnet Security
• Duo Security
• SecurEnvoy
• SMS Passcode
• Swivel Secure
• TeleSign
• Trustwave

Market Driver
• Rise in Mobile Workforce
• For a full, detailed list, view our report

Market Challenge
• Intense Vendor Competition
• For a full, detailed list, view our report

Market Trend
• Increase in M&A
• For a full, detailed list, view our report

Key Questions Answered in this Report
• What will the market size be in 2019 and what will the growth rate be?
• What are the key market trends?
• What is driving this market?
• What are the challenges to market growth?
• Who are the key vendors in this market space?
• What are the market opportunities and threats faced by the key vendors?
• What are the strengths and weaknesses of the key vendors?
01. Executive Summary
02. List of Abbreviations
03. Scope of the Report
03.1 Market Overview
04. Market Research Methodology
04.1 Market Research Process
04.2 Research Methodology
05. Introduction
06. Market Description
06.1 Phone-Based Authentication Processes
06.2 Evolution of Value Chain for Mobile Payments
07. Market Landscape
07.1 Market Overview
07.1.1 Market Structure
07.1.2 Market Size and Forecast
07.2 Five Forces Analysis
08. Product Life Cycle Analysis
09. Market Segmentation by End-User
09.1 Global Phone-Based Authentication Market by End-User 2014-2019
09.2 Global Phone-Based Authentication Market by BFSI Sector
09.2.1 Market Size and Forecast
09.3 Global Phone-Based Authentication Market by PCI Sector
09.3.1 Market Size and Forecast
09.4 Global Phone-Based Authentication Market by Government Organizations
09.4.1 Market Size and Forecast
10. Geographical Segmentation
10.1 Global Phone-Based Authentication Market by Geographical Segmentation 2014-2019
10.1.1 Global Phone-Based Authentication Market by Geographical Segmentation 2014-2019 ($ millions)
10.1.2 Phone-Based Authentication Market in the Americas
10.1.3 Phone-Based Authentication Market in EMEA
10.1.4 Phone-Based Authentication Market in APAC
11. Buying Criteria
12. Market Growth Drivers
13. Drivers and their Impact
14. Market Challenges
15. Impact of Drivers and Challenges
16. Market Trends
17. Trends and their Impact
18. Vendor Landscape
18.1 Competitive Scenario
18.2 Product Offerings
18.3 Vendor Analysis
18.3.1 Key News
18.3.2 Mergers and Acquisitions
18.3.3 Comparison of Vendors based on their Presence in Various Regions
18.4 Other Prominent Vendors
19. Key Developments
19.1 Mobile Connect Technology
20. Key Vendor Analysis
20.1 CA Technologies
20.1.1 Key Facts
20.1.2 Business Overview
20.1.3 Business Segmentation by Revenue 2013
20.1.4 Business Segmentation by Revenue 2012 and 2013
20.1.5 Geographical Segmentation by Revenue 2013
20.1.6 Business Strategy
20.1.7 Recent Developments
20.1.8 SWOT Analysis
20.2 EMC²
20.2.1 Key Facts
20.2.2 Business Overview
20.2.3 Business Segmentation by Revenue 2013
20.2.4 Business Segmentation by Revenue 2012 and 2013
20.2.5 Geographical Segmentation by Revenue 2013
20.2.6 Business Strategy
20.2.7 Recent Developments
20.2.8 SWOT Analysis
20.3 Gemalto
20.3.1 Key Facts
20.3.2 Business Overview
20.3.3 Business Segmentation by Revenue 2013
20.3.4 Business Segmentation by Revenue 2012 and 2013
20.3.5 Geographical Segmentation by Revenue 2013
20.3.6 Business Strategy
20.3.7 Recent Developments
20.3.8 SWOT Analysis
20.4 Microsoft
20.4.1 Key Facts
20.4.2 Business Overview
20.4.3 Business Segmentation by Revenue 2013
20.4.4 Business Segmentation by Revenue 2012 and 2013
20.4.5 Geographical Segmentation by Revenue 2013
20.4.6 Business Strategy
20.4.7 Recent Developments
20.4.8 SWOT Analysis
20.5 Symantec
20.5.1 Key Facts
20.5.2 Business Overview
20.5.3 Business Segmentation by Revenue 2013
20.5.4 Business Segmentation by Revenue 2013 and 2014
20.5.5 Geographical Segmentation by Revenue 2013
20.5.6 Business Strategy
20.5.7 Recent Developments
20.5.8 SWOT Analysis
20.6 Technology Nexus
20.6.1 Key Facts
20.6.2 Business overview
20.6.3 Recent Developments
20.6.4 SWOT Analysis
20.7 Vasco
20.7.1 Key Facts
20.7.2 Business Overview
20.7.3 Business Segmentation by Revenue 2013
20.7.4 Business Segmentation by Revenue 2012 and 2013
20.7.5 Geographical Segmentation by Revenue 2013
20.7.6 Recent Developments
20.7.7 SWOT Analysis
21. Other Reports in this Series
List of Exhibits
Exhibit 1: Market Research Methodology
Exhibit 2: Phone-Based Authentication Processes
Exhibit 3: Traditional Value Chain
Exhibit 4: New Value Chain
Exhibit 5: Market Structure
Exhibit 6: Global Phone-Based Authentication Market 2014-2019 ($ millions)
Exhibit 7: Product Life Cycle Analysis
Exhibit 8: Global Phone-Based Authentication Market by End-User 2014-2019
Exhibit 9: Global Phone-Based Authentication Market by BFSI Sector 2014-2019 ($ millions)
Exhibit 10: Global Phone-Based Authentication Market by PCI Sector 2014-2019 ($ millions)
Exhibit 11: Global Phone-Based Authentication Market by Government Organizations 2014-2019 ($ millions)
Exhibit 12: Global Phone-Based Authentication Market by Geographical Segmentation 2014-2019
Exhibit 13: Global Phone-Based Authentication Market by Geographical Segmentation 2014-2019 ($ millions)
Exhibit 14: Comparison of Vendors based on their Presence in Various Regions
Exhibit 15: CA Technologies: Business Segmentation by Revenue 2013
Exhibit 16: CA Technologies: Business Segmentation by Revenue 2012 and 2013 ($ millions)
Exhibit 17: CA Technologies: Geographical Segmentation by Revenue 2013
Exhibit 18: EMC²: Business Segmentation by Revenue 2013
Exhibit 19: EMC²: Business Segmentation by Revenue 2012 and 2013 ($ millions)
Exhibit 20: EMC²: Geographical Segmentation by Revenue 2013
Exhibit 21: Gemalto: Business Segmentation by Revenue 2013
Exhibit 22: Gemalto: Business Segmentation by Revenue 2012 and 2013 ($ millions)
Exhibit 23: Gemalto: Geographical Segmentation by Revenue 2013
Exhibit 24: Microsoft: Business Segmentation by Revenue 2013
Exhibit 25: Microsoft: Business Segmentation by Revenue 2012 and 2013 ($ billions)
Exhibit 26: Microsoft: Geographical Segmentation by Revenue 2013
Exhibit 27: Symantec: Business Segmentation by Revenue 2013
Exhibit 28: Symantec: Business Segmentation by Revenue 2013 and 2014 ($ millions)
Exhibit 29: Symantec: Geographical Segmentation by Revenue 2013
Exhibit 30: Vasco: Business Segmentation by Revenue 2013
Exhibit 31: Vasco: Business Segmentation by Revenue 2012 and 2013 ($ millions)
Exhibit 32: Vasco: Geographical Segmentation by Revenue 2013

PURCHASE OPTIONS
 
 
 

How can we help you?

Contact us at the Consulting WP office nearest to you or submit a business inquiry online.


  Contact
 

Subscribe to Our Newsletter

 
 
REQUEST SAMPLE    ASK FOR DISCOUNT