Authentication Mechanisms: The Digital Arms Race
£1,000.00 excl VAT
Companies that can provide quick and robust authentication mechanisms will be in a strategically important position in the digital economy, and this is sparking an arms race among the major Internet ecosystems – Apple, Google, Facebook and Amazon. This race is intensifying as biometrics and wearables promise to make two-factor authentication easier and more cost-effective. What are the strategies of the internet players, and where do they need help?
Description
Format: PDF file
Pages: 44 pages Charts: 19 Author: STL research team Publication Date: May 2015Table of Contents
- Introduction
- Executive summary
- The authentication arms race
- Extending the authentication ecosystem
- New technologies, new business models
- Planning for key scenarios
- Online shopping
- Low value in-store shopping
- Access to vehicles and buildings
- Remote control of machines and appliances
- Takeaways
- How the Internet ecosystems handle ID
- Apple – Adding value to hardware
- Google – authentication improves targeting
- Facebook – needs more accurate authentication
- Amazon – in need of more transparency
- Conclusions and implications for telcos
Table of Figures
- Figure 1: Effective authentication is at the heart of the Internet players’ flywheels
- Figure 2: Facebook and Google appear to dominate online authentication
- Figure 3: The number of data breaches in the US hit a record high last year
- Figure 4: Merchants employ multiple weapons in the fight against fraud
- Figure 5: Apple Pay has been integrated into Passbook to create a mobile wallet
- Figure 6: The consumer is identified via the iPhone’s fingerprint scanner
- Figure 7: Various apps allow consumers to make payments via Apple Pay
- Figure 8: SWOT analysis of Apple in authentication and identification
- Figure 9: TOWS analysis for Apple in authentication and identification
- Figure 10: Google Authenticator helps Google link users with mobile phone numbers
- Figure 11: SWOT analysis of Google in authentication and identification
- Figure 12: TOWS analysis for Google in authentication and identification
- Figure 13: Not all Facebook users take the service seriously
- Figure 14: Popular fitness tracking app Strava uses Facebook Connect
- Figure 15: SWOT analysis of Facebook in authentication and identification
- Figure 16: TOWS analysis for Facebook in authentication and identification
- Figure 17: Some Amazon users don’t trust the product reviews
- Figure 18: SWOT analysis of Amazon in authentication and identification
- Figure 19: TOWS analysis for Amazon in authentication and identification
Technologies and industry terms referenced include: