Authentication Mechanisms: The Digital Arms Race

£1,000.00 excl VAT

Companies that can provide quick and robust authentication mechanisms will be in a strategically important position in the digital economy, and this is sparking an arms race among the major Internet ecosystems – Apple, Google, Facebook and Amazon. This race is intensifying as biometrics and wearables promise to make two-factor authentication easier and more cost-effective. What are the strategies of the internet players, and where do they need help?

Description

Format: PDF filePages: 44 pagesCharts: 19Author: STL research teamPublication Date: May 2015

Table of Contents

  • Introduction
  • Executive summary
  • The authentication arms race
  • Extending the authentication ecosystem
  • New technologies, new business models
  • Planning for key scenarios
  • Online shopping
  • Low value in-store shopping
  • Access to vehicles and buildings
  • Remote control of machines and appliances
  • Takeaways
  • How the Internet ecosystems handle ID
  • Apple – Adding value to hardware
  • Google – authentication improves targeting
  • Facebook – needs more accurate authentication
  • Amazon – in need of more transparency
  • Conclusions and implications for telcos

Table of Figures

  • Figure 1: Effective authentication is at the heart of the Internet players’ flywheels
  • Figure 2: Facebook and Google appear to dominate online authentication
  • Figure 3: The number of data breaches in the US hit a record high last year
  • Figure 4: Merchants employ multiple weapons in the fight against fraud
  • Figure 5: Apple Pay has been integrated into Passbook to create a mobile wallet
  • Figure 6: The consumer is identified via the iPhone’s fingerprint scanner
  • Figure 7: Various apps allow consumers to make payments via Apple Pay
  • Figure 8: SWOT analysis of Apple in authentication and identification
  • Figure 9: TOWS analysis for Apple in authentication and identification
  • Figure 10: Google Authenticator helps Google link users with mobile phone numbers
  • Figure 11: SWOT analysis of Google in authentication and identification
  • Figure 12: TOWS analysis for Google in authentication and identification
  • Figure 13: Not all Facebook users take the service seriously
  • Figure 14: Popular fitness tracking app Strava uses Facebook Connect
  • Figure 15: SWOT analysis of Facebook in authentication and identification
  • Figure 16: TOWS analysis for Facebook in authentication and identification
  • Figure 17: Some Amazon users don’t trust the product reviews
  • Figure 18: SWOT analysis of Amazon in authentication and identification
  • Figure 19: TOWS analysis for Amazon in authentication and identification

Technologies and industry terms referenced include: