Cover Image
市場調查報告書

以電話為基礎的認證市場:全球市場預測與預測 (2015∼2019年)

Phone-based Authentication: Global Market Outlook and Forecast 2015-2019

出版商 TechNavio (Infiniti Research Ltd.) 商品編碼 222986
出版日期 內容資訊 英文 82 Pages
訂單完成後即時交付
價格
Back to Top
以電話為基礎的認證市場:全球市場預測與預測 (2015∼2019年) Phone-based Authentication: Global Market Outlook and Forecast 2015-2019
出版日期: 2015年07月15日 內容資訊: 英文 82 Pages
簡介

電話要素為二因素/多因素認證的第二層部分。以電話為基礎的認證,是可由終端用戶行動電話和智慧型手機實行,更先進層級的認證手段。具體來說採用驗證碼和文字訊息、通話實行。認證流程主要在銀行等付款機關,用於資金交易中保持機密、用戶認證。再加上隨著行動通訊業者 (MNO) 提供2G/3G/4G網路服務,提供使用者一次性密碼 (OTP) ,打算進行效率性地運用線上交易和行動銀行。因此,MNO在全球以電話為基礎的認證市場成長中發揮重要作用。全球以電話為基礎的認證市場,預計從2014年到2019年之間,以49.33%的年複合成長率 (CAGR) 擴大。

本報告提供南北美洲、歐洲&中東&非洲 (EMEA)、亞太地區以電話為基礎的認證市場實際成果分析、該市場的現狀和成長預測、主要供應商的資訊等資訊彙整,為您概述為以下內容。

第1章 摘要整理

第2章 簡稱集

第3章 分析範圍

  • 市場概要

第4章 市場分析技術

  • 市場分析的流程
  • 分析方法

第5章 簡介

第6章 市場概要

  • 以電話為基礎的認證流程
  • 行動付款的價值鏈的演進

第7章 市場環境

  • 市場概況
    • 市場結構
    • 市場規模與其預測
  • 波特的五力分析

第8章 產品生命週期分析

第9章 各終端用戶的市場區隔

  • 全球以電話為基礎的認證市場:各終端用戶的詳細趨勢 (今後6年份)
  • BFSI (銀行、金融服務、保險) 之市場
  • PCI (支付卡產業) 之市場
  • 政府機關市場

第10章 地區區分

  • 全球以電話為基礎的認證市場:各地區的區分 (今後6年份)
    • 市場規模的變化與預測:各地區 (以金額為準,今後6年份)
    • 南北美洲市場
    • 歐洲、中東、非洲地區 (EMEA) 市場
    • 亞太地區市場

第11章 購買標準

第12章 促進市場成長的要素

第13章 推動因素與其影響力

第14章 市場課題

第15章 推動因素、課題的影響力

第16章 市場趨勢

第17章 市場趨勢與其影響

第18章 供應商環境

  • 競爭方案
  • 主要的產品
  • 供應商分析
    • 近幾年的主要趨勢
    • 企業合併、收購 (M&A)
    • 供應商間比較:全球各地的存在感
  • 其他卓越供應商

第19章 主要技術開發的動向

  • 行動連線技術

第20章 主要供應商分析

  • CA Technologies
    • 主要資料
    • 產業概要
    • 各部門的市場收益額 (最新值)
    • 各部門的市場收益額 (與上年度的比較)
    • 各地區的市場收益額 (最新值)
    • 產業策略
    • 最近的發展趨勢
    • SWOT分析
  • EMC2
  • Gemalto
  • Microsoft
  • Symantec
  • Technology Nexus
  • Vasco

第21章 相關報告

圖表一覽

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄
Product Code: IRTNTR6224

About Phone-based Authentication

The phone-factor is the second layer of two-factor or multi-factor authentication. Phone-based authentication is enabled through an end-user's cell phone or smartphone and provides an advanced level of authentication. The authentication process is done using passcodes, text messages, or phone calls. It is mainly used by banks and payment gateways to ensure confidentiality and to verify the authenticity of the user during monetary transactions. It is also being adopted by other sectors such as healthcare. It is a cost-effective method compared to hardware tokens for securing information.

With advances in technology, several mobile network operators (MNOs) have introduced 2G, 3G, and 4G network services. This helps them improve their efficiency in sending OTP to customers for their online transactions and mobile banking. Thus, MNOs play an important role in the growth of the global phone-based authentication market.

Technavio's analysts forecast the global phone-based authentication market to grow at a CAGR of 49.33% over the period 2014-2019.

Covered in this Report

This report covers the present scenario and the growth prospects of the global phone-based authentication market for the period 2015-2019. To calculate the market size, the report considers the revenue generated from the sales of the phone-based authentication solutions.

The market is segmented on the basis of the following:

  • Geography: Americas, EMEA, and APAC
  • End-users: BFSI, PCI, government organizations, and others sectors

Technavio's report, Global Phone-based Authentication Market 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in this market.

Key Regions

  • Americas
  • APAC
  • EMEA

Key Vendors

  • CA Technologies
  • EMC
  • Gemalto
  • Microsoft
  • Symantec
  • Technology Nexus
  • VASCO

Other Prominent Vendors

  • Deepnet Security
  • Duo Security
  • SecurEnvoy
  • SMS Passcode
  • Swivel Secure
  • TeleSign
  • Trustwave

Market Driver

  • Rise in Mobile Workforce
  • For a full, detailed list, view our report

Market Challenge

  • Intense Vendor Competition
  • For a full, detailed list, view our report

Market Trend

  • Increase in M&A
  • For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2019 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

Table of Contents

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

  • 03.1. Market Overview

04. Market Research Methodology

  • 04.1. Market Research Process
  • 04.2. Research Methodology

05. Introduction

06. Market Description

  • 06.1. Phone-Based Authentication Processes
  • 06.2. Evolution of Value Chain for Mobile Payments

07. Market Landscape

  • 07.1. Market Overview
    • 07.1.1. Market Structure
    • 07.1.2. Market SizeKKKKK and Forecast
  • 07.2. Five Forces Analysis

08. Product Life Cycle Analysis

09. Market Segmentation by End-User

  • 09.1. Global Phone-Based Authentication Market by End-User 2014-2019
  • 09.2. Global Phone-Based Authentication Market by BFSI Sector
    • 09.2.1. Market SizeKKKKK and Forecast
  • 09.3. Global Phone-Based Authentication Market by PCI Sector
    • 09.3.1. Market SizeKKKKK and Forecast
  • 09.4. Global Phone-Based Authentication Market by Government Organizations
    • 09.4.1. Market SizeKKKKK and Forecast

10. Geographical Segmentation

  • 10.1. Global Phone-Based Authentication Market by Geographical Segmentation 2014-2019
    • 10.1.1. Global Phone-Based Authentication Market by Geographical Segmentation 2014-2019($ millions)
    • 10.1.2. Phone-Based Authentication Market in the Americas
    • 10.1.3. Phone-Based Authentication Market in EMEA
    • 10.1.4. Phone-Based Authentication Market in APAC

11. Buying Criteria

12. Market Growth Drivers

13. DriversKKKKK and their Impact

14. Market Challenges

15. Impact of DriversKKKKK and Challenges

16. Market Trends

17. TrendsKKKKK and their Impact

18. Vendor Landscape

  • 18.1. Competitive Scenario
  • 18.2. Product Offerings
  • 18.3. Vendor Analysis
    • 18.3.1. Key News
    • 18.3.2. MergersKKKKK and Acquisitions
    • 18.3.3. Comparison of Vendors based on their Presence in Various Regions
  • 18.4. Other Prominent Vendors

19. Key Developments

  • 19.1. Mobile Connect Technology

20. Key Vendor Analysis

  • 20.1. CA Technologies
    • 20.1.1. Key Facts
    • 20.1.2. Business Overview
    • 20.1.3. Business Segmentation by Revenue 2013
    • 20.1.4. Business Segmentation by Revenue 2012KKKKK and 2013
    • 20.1.5. Geographical Segmentation by Revenue 2013
    • 20.1.6. Business Strategy
    • 20.1.7. Recent Developments
    • 20.1.8. SWOT Analysis
  • 20.2. EMC²
    • 20.2.1. Key Facts
    • 20.2.2. Business Overview
    • 20.2.3. Business Segmentation by Revenue 2013
    • 20.2.4. Business Segmentation by Revenue 2012KKKKK and 2013
    • 20.2.5. Geographical Segmentation by Revenue 2013
    • 20.2.6. Business Strategy
    • 20.2.7. Recent Developments
    • 20.2.8. SWOT Analysis
  • 20.3. Gemalto
    • 20.3.1. Key Facts
    • 20.3.2. Business Overview
    • 20.3.3. Business Segmentation by Revenue 2013
    • 20.3.4. Business Segmentation by Revenue 2012KKKKK and 2013
    • 20.3.5. Geographical Segmentation by Revenue 2013
    • 20.3.6. Business Strategy
    • 20.3.7. Recent Developments
    • 20.3.8. SWOT Analysis
  • 20.4. Microsoft
    • 20.4.1. Key Facts
    • 20.4.2. Business Overview
    • 20.4.3. Business Segmentation by Revenue 2013
    • 20.4.4. Business Segmentation by Revenue 2012KKKKK and 2013
    • 20.4.5. Geographical Segmentation by Revenue 2013
    • 20.4.6. Business Strategy
    • 20.4.7. Recent Developments
    • 20.4.8. SWOT Analysis
  • 20.5. Symantec
    • 20.5.1. Key Facts
    • 20.5.2. Business Overview
    • 20.5.3. Business Segmentation by Revenue 2013
    • 20.5.4. Business Segmentation by Revenue 2013KKKKK and 2014
    • 20.5.5. Geographical Segmentation by Revenue 2013
    • 20.5.6. Business Strategy
    • 20.5.7. Recent Developments
    • 20.5.8. SWOT Analysis
  • 20.6. Technology Nexus
    • 20.6.1. Key Facts
    • 20.6.2. Business overview
    • 20.6.3. Recent Developments
    • 20.6.4. SWOT Analysis
  • 20.7. Vasco
    • 20.7.1. Key Facts
    • 20.7.2. Business Overview
    • 20.7.3. Business Segmentation by Revenue 2013
    • 20.7.4. Business Segmentation by Revenue 2012KKKKK and 2013
    • 20.7.5. Geographical Segmentation by Revenue 2013
    • 20.7.6. Recent Developments
    • 20.7.7. SWOT Analysis

21. Other Reports in this Series

List of Exhibits

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Phone-Based Authentication Processes
  • Exhibit 3: Traditional Value Chain
  • Exhibit 4: New Value Chain
  • Exhibit 5: Market Structure
  • Exhibit 6: Global Phone-Based Authentication Market 2014-2019 ($ millions)
  • Exhibit 7: Product Life Cycle Analysis
  • Exhibit 8: Global Phone-Based Authentication Market by End-User 2014-2019
  • Exhibit 9: Global Phone-Based Authentication Market by BFSI Sector 2014-2019 ($ millions)
  • Exhibit 10: Global Phone-Based Authentication Market by PCI Sector 2014-2019 ($ millions)
  • Exhibit 11: Global Phone-Based Authentication Market by Government Organizations 2014-2019 ($ millions)
  • Exhibit 12: Global Phone-Based Authentication Market by Geographical Segmentation 2014-2019
  • Exhibit 13: Global Phone-Based Authentication Market by Geographical Segmentation 2014-2019 ($ millions)
  • Exhibit 14: Comparison of Vendors based on their Presence in Various Regions
  • Exhibit 15: CA Technologies: Business Segmentation by Revenue 2013
  • Exhibit 16: CA Technologies: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 17: CA Technologies: Geographical Segmentation by Revenue 2013
  • Exhibit 18: EMC²: Business Segmentation by Revenue 2013
  • Exhibit 19: EMC²: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 20: EMC²: Geographical Segmentation by Revenue 2013
  • Exhibit 21: Gemalto: Business Segmentation by Revenue 2013
  • Exhibit 22: Gemalto: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 23: Gemalto: Geographical Segmentation by Revenue 2013
  • Exhibit 24: Microsoft: Business Segmentation by Revenue 2013
  • Exhibit 25: Microsoft: Business Segmentation by Revenue 2012 and 2013($ billions)
  • Exhibit 26: Microsoft: Geographical Segmentation by Revenue 2013
  • Exhibit 27: Symantec: Business Segmentation by Revenue 2013
  • Exhibit 28: Symantec: Business Segmentation by Revenue 2013 and 2014 ($ millions)
  • Exhibit 29: Symantec: Geographical Segmentation by Revenue 2013
  • Exhibit 30: Vasco: Business Segmentation by Revenue 2013
  • Exhibit 31: Vasco: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 32: Vasco: Geographical Segmentation by Revenue 2013
Back to Top