表紙
市場調査レポート

電話ベースの認証市場:世界市場の見通しと予測 (2015〜2019年)

Phone-based Authentication: Global Market Outlook and Forecast 2015-2019

発行 TechNavio (Infiniti Research Ltd.) 商品コード 222986
出版日 ページ情報 英文 82 Pages
即納可能
価格
本日の銀行送金レート: 1USD=101.75円で換算しております。
Back to Top
電話ベースの認証市場:世界市場の見通しと予測 (2015〜2019年) Phone-based Authentication: Global Market Outlook and Forecast 2015-2019
出版日: 2015年07月15日 ページ情報: 英文 82 Pages
概要

電話要素は、二要素/多要素認証の第二層となる部分です。電話ベースの認証は、エンドユーザーの携帯電話やスマートフォンから実行可能できる、より高度なレベルの認証手段です。具体的には、パスコードやテキストメッセージ、通話を用いて実行されます。認証プロセスは主に銀行等の決済機関で、資金取引中の機密保持・ユーザー認証に使用されます。さらに、移動体通信事業者 (MNO) が2G/3G/4Gネットワークサービスを提供するのに伴い、利用者にワンタイム・パスワード (OTP) を提供して、オンライン取引やモバイルバンキングを効率的に運用しようとしています。そのため、MNOは世界の電話ベース認証市場の成長において重要な役割を果たしています。世界の電話ベースの認証市場は、2014年から2019年の間、49.33%のCAGR (複合年間成長率) で拡大する見込みです。

当レポートでは、南北アメリカ、欧州・中東・アフリカ (EMEA)、アジア太平洋地域における電話ベースの認証市場の実績を分析しており、同市場の現況や成長の見通し、主要ベンダーの情報などの情報を取りまとめてお届けします。

第1章 エグゼクティブサマリー

第2章 略語集

第3章 分析範囲

  • 市場概要

第4章 市場分析の手法

  • 市場分析のプロセス
  • 分析手法

第5章 イントロダクション

第6章 市場概略

  • 電話ベースの認証プロセス
  • モバイルペイメントのバリューチェーンの進化

第7章 市場環境

  • 市場概況
    • 市場構造
    • 市場規模とその予測
  • ファイブフォース分析

第8章 製品ライフサイクルの分析

第9章 エンドユーザー別の市場区分

  • 世界の電話ベースの認証市場:エンドユーザー別の詳細動向 (今後6年間分)
  • BFSI (銀行・金融サービス・保険) 向け市場
  • PCI (決済カード業界) 向け市場
  • 政府機関向け市場

第10章 地域区分

  • 世界の電話ベースの認証市場:地域別の区分 (今後6年間分)
    • 市場規模の推移と予測:地域別 (金額ベース、今後6年間分)
    • 南北アメリカ市場
    • 欧州・中東・アフリカ地域 (EMEA) 市場
    • アジア太平洋地域市場

第11章 購入基準

第12章 市場の成長促進要因

第13章 促進要因とその影響力

第14章 市場の課題

第15章 促進要因・課題の影響力

第16章 市場の傾向

第17章 市場動向とその影響

第18章 ベンダー環境

  • 競争シナリオ
  • 主な製品
  • ベンダー分析
    • 近年の主な動向
    • 企業合併・買収 (M&A)
    • ベンダー間比較:世界各地でのプレゼンス
  • その他の有力ベンダー

第19章 主な技術開発の動き

  • モバイル接続技術

第20章 主要ベンダーの分析

  • CA Technologies
    • 主要データ
    • 事業概要
    • 部門別の市場収益額 (最新値)
    • 部門別の市場収益額 (前年度との比較)
    • 地域別の市場収益額 (最新値)
    • 事業戦略
    • 最近の発展動向
    • SWOT分析
  • EMC2
  • Gemalto
  • Microsoft
  • Symantec
  • Technology Nexus
  • Vasco

第21章 関連レポート

図表一覧

このページに掲載されている内容は最新版と異なる場合があります。詳細はお問い合わせください。

目次
Product Code: IRTNTR6224

About Phone-based Authentication

The phone-factor is the second layer of two-factor or multi-factor authentication. Phone-based authentication is enabled through an end-user's cell phone or smartphone and provides an advanced level of authentication. The authentication process is done using passcodes, text messages, or phone calls. It is mainly used by banks and payment gateways to ensure confidentiality and to verify the authenticity of the user during monetary transactions. It is also being adopted by other sectors such as healthcare. It is a cost-effective method compared to hardware tokens for securing information.

With advances in technology, several mobile network operators (MNOs) have introduced 2G, 3G, and 4G network services. This helps them improve their efficiency in sending OTP to customers for their online transactions and mobile banking. Thus, MNOs play an important role in the growth of the global phone-based authentication market.

Technavio's analysts forecast the global phone-based authentication market to grow at a CAGR of 49.33% over the period 2014-2019.

Covered in this Report

This report covers the present scenario and the growth prospects of the global phone-based authentication market for the period 2015-2019. To calculate the market size, the report considers the revenue generated from the sales of the phone-based authentication solutions.

The market is segmented on the basis of the following:

  • Geography: Americas, EMEA, and APAC
  • End-users: BFSI, PCI, government organizations, and others sectors

Technavio's report, Global Phone-based Authentication Market 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in this market.

Key Regions

  • Americas
  • APAC
  • EMEA

Key Vendors

  • CA Technologies
  • EMC
  • Gemalto
  • Microsoft
  • Symantec
  • Technology Nexus
  • VASCO

Other Prominent Vendors

  • Deepnet Security
  • Duo Security
  • SecurEnvoy
  • SMS Passcode
  • Swivel Secure
  • TeleSign
  • Trustwave

Market Driver

  • Rise in Mobile Workforce
  • For a full, detailed list, view our report

Market Challenge

  • Intense Vendor Competition
  • For a full, detailed list, view our report

Market Trend

  • Increase in M&A
  • For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2019 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

Table of Contents

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

  • 03.1. Market Overview

04. Market Research Methodology

  • 04.1. Market Research Process
  • 04.2. Research Methodology

05. Introduction

06. Market Description

  • 06.1. Phone-Based Authentication Processes
  • 06.2. Evolution of Value Chain for Mobile Payments

07. Market Landscape

  • 07.1. Market Overview
    • 07.1.1. Market Structure
    • 07.1.2. Market SizeKKKKK and Forecast
  • 07.2. Five Forces Analysis

08. Product Life Cycle Analysis

09. Market Segmentation by End-User

  • 09.1. Global Phone-Based Authentication Market by End-User 2014-2019
  • 09.2. Global Phone-Based Authentication Market by BFSI Sector
    • 09.2.1. Market SizeKKKKK and Forecast
  • 09.3. Global Phone-Based Authentication Market by PCI Sector
    • 09.3.1. Market SizeKKKKK and Forecast
  • 09.4. Global Phone-Based Authentication Market by Government Organizations
    • 09.4.1. Market SizeKKKKK and Forecast

10. Geographical Segmentation

  • 10.1. Global Phone-Based Authentication Market by Geographical Segmentation 2014-2019
    • 10.1.1. Global Phone-Based Authentication Market by Geographical Segmentation 2014-2019($ millions)
    • 10.1.2. Phone-Based Authentication Market in the Americas
    • 10.1.3. Phone-Based Authentication Market in EMEA
    • 10.1.4. Phone-Based Authentication Market in APAC

11. Buying Criteria

12. Market Growth Drivers

13. DriversKKKKK and their Impact

14. Market Challenges

15. Impact of DriversKKKKK and Challenges

16. Market Trends

17. TrendsKKKKK and their Impact

18. Vendor Landscape

  • 18.1. Competitive Scenario
  • 18.2. Product Offerings
  • 18.3. Vendor Analysis
    • 18.3.1. Key News
    • 18.3.2. MergersKKKKK and Acquisitions
    • 18.3.3. Comparison of Vendors based on their Presence in Various Regions
  • 18.4. Other Prominent Vendors

19. Key Developments

  • 19.1. Mobile Connect Technology

20. Key Vendor Analysis

  • 20.1. CA Technologies
    • 20.1.1. Key Facts
    • 20.1.2. Business Overview
    • 20.1.3. Business Segmentation by Revenue 2013
    • 20.1.4. Business Segmentation by Revenue 2012KKKKK and 2013
    • 20.1.5. Geographical Segmentation by Revenue 2013
    • 20.1.6. Business Strategy
    • 20.1.7. Recent Developments
    • 20.1.8. SWOT Analysis
  • 20.2. EMC²
    • 20.2.1. Key Facts
    • 20.2.2. Business Overview
    • 20.2.3. Business Segmentation by Revenue 2013
    • 20.2.4. Business Segmentation by Revenue 2012KKKKK and 2013
    • 20.2.5. Geographical Segmentation by Revenue 2013
    • 20.2.6. Business Strategy
    • 20.2.7. Recent Developments
    • 20.2.8. SWOT Analysis
  • 20.3. Gemalto
    • 20.3.1. Key Facts
    • 20.3.2. Business Overview
    • 20.3.3. Business Segmentation by Revenue 2013
    • 20.3.4. Business Segmentation by Revenue 2012KKKKK and 2013
    • 20.3.5. Geographical Segmentation by Revenue 2013
    • 20.3.6. Business Strategy
    • 20.3.7. Recent Developments
    • 20.3.8. SWOT Analysis
  • 20.4. Microsoft
    • 20.4.1. Key Facts
    • 20.4.2. Business Overview
    • 20.4.3. Business Segmentation by Revenue 2013
    • 20.4.4. Business Segmentation by Revenue 2012KKKKK and 2013
    • 20.4.5. Geographical Segmentation by Revenue 2013
    • 20.4.6. Business Strategy
    • 20.4.7. Recent Developments
    • 20.4.8. SWOT Analysis
  • 20.5. Symantec
    • 20.5.1. Key Facts
    • 20.5.2. Business Overview
    • 20.5.3. Business Segmentation by Revenue 2013
    • 20.5.4. Business Segmentation by Revenue 2013KKKKK and 2014
    • 20.5.5. Geographical Segmentation by Revenue 2013
    • 20.5.6. Business Strategy
    • 20.5.7. Recent Developments
    • 20.5.8. SWOT Analysis
  • 20.6. Technology Nexus
    • 20.6.1. Key Facts
    • 20.6.2. Business overview
    • 20.6.3. Recent Developments
    • 20.6.4. SWOT Analysis
  • 20.7. Vasco
    • 20.7.1. Key Facts
    • 20.7.2. Business Overview
    • 20.7.3. Business Segmentation by Revenue 2013
    • 20.7.4. Business Segmentation by Revenue 2012KKKKK and 2013
    • 20.7.5. Geographical Segmentation by Revenue 2013
    • 20.7.6. Recent Developments
    • 20.7.7. SWOT Analysis

21. Other Reports in this Series

List of Exhibits

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Phone-Based Authentication Processes
  • Exhibit 3: Traditional Value Chain
  • Exhibit 4: New Value Chain
  • Exhibit 5: Market Structure
  • Exhibit 6: Global Phone-Based Authentication Market 2014-2019 ($ millions)
  • Exhibit 7: Product Life Cycle Analysis
  • Exhibit 8: Global Phone-Based Authentication Market by End-User 2014-2019
  • Exhibit 9: Global Phone-Based Authentication Market by BFSI Sector 2014-2019 ($ millions)
  • Exhibit 10: Global Phone-Based Authentication Market by PCI Sector 2014-2019 ($ millions)
  • Exhibit 11: Global Phone-Based Authentication Market by Government Organizations 2014-2019 ($ millions)
  • Exhibit 12: Global Phone-Based Authentication Market by Geographical Segmentation 2014-2019
  • Exhibit 13: Global Phone-Based Authentication Market by Geographical Segmentation 2014-2019 ($ millions)
  • Exhibit 14: Comparison of Vendors based on their Presence in Various Regions
  • Exhibit 15: CA Technologies: Business Segmentation by Revenue 2013
  • Exhibit 16: CA Technologies: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 17: CA Technologies: Geographical Segmentation by Revenue 2013
  • Exhibit 18: EMC²: Business Segmentation by Revenue 2013
  • Exhibit 19: EMC²: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 20: EMC²: Geographical Segmentation by Revenue 2013
  • Exhibit 21: Gemalto: Business Segmentation by Revenue 2013
  • Exhibit 22: Gemalto: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 23: Gemalto: Geographical Segmentation by Revenue 2013
  • Exhibit 24: Microsoft: Business Segmentation by Revenue 2013
  • Exhibit 25: Microsoft: Business Segmentation by Revenue 2012 and 2013($ billions)
  • Exhibit 26: Microsoft: Geographical Segmentation by Revenue 2013
  • Exhibit 27: Symantec: Business Segmentation by Revenue 2013
  • Exhibit 28: Symantec: Business Segmentation by Revenue 2013 and 2014 ($ millions)
  • Exhibit 29: Symantec: Geographical Segmentation by Revenue 2013
  • Exhibit 30: Vasco: Business Segmentation by Revenue 2013
  • Exhibit 31: Vasco: Business Segmentation by Revenue 2012 and 2013 ($ millions)
  • Exhibit 32: Vasco: Geographical Segmentation by Revenue 2013
Back to Top