Click here to close now.




















Welcome!

@CloudExpo Authors: Liz McMillan, Elizabeth White, Pat Romanski, Kaazing Blog, Ian Khan

News Feed Item

Global Secure USB Token Market 2010

NEW YORK, Dec. 31, 2012 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

Global Secure USB Token Market 2010

http://www.reportlinker.com/p0312803/Global-Secure-USB-Token-Market-2010...

Executive Summary

End users have become accustomed to both smart card security, and the USB token form factor. It has taken years for the industry to merge them, and to develop secure USB tokens, bringing the security of smart cards in a form factor familiar to PC users.

Secure USB tokens are used in a variety of market segments:

Secure mass storage brings users high mass storage capacities, along with security,

Enterprise security allows IT managers to run a global security policy, by equipping employees with secure USB tokens,

Online banking provides security in internet banking, which is now highly required as passwords, and static methods have proved to be easily defeated,

eGovernment is a global trend started with ePassports and eIDs, secure USB tokens bring a convenient form factor for remote citizen authentication,

Transport is where secure USB tokens bring the convenience on contactless communications with the ability for end users to connect the device on their own PC.

In 2010, the total market for secure USB tokens amounts to 48.9 million units, or EUR 444 million. As they were the starting point of the development of secure USB tokens, secure mass storage and online banking combined represent 91% of this total.

The next few years will see the emergence of new segments. Enterprise security will take off with the adoption of secure USB tokens being driven by an increasing sensitivity to risk, and a better integration with operating systems. Secure USB tokens in Transport, which are now a pilot stage, will be adopted by several cities before the end of the period, making the segment represent larger volumes. And secure USB tokens will start to be adopted by governments for eGovernment applications to cope with a higher demand for eGovernment services from citizens.

As a part of the cost of secure USB tokens comes from memory, we anticipate the ASP (average selling price) will drop over the period.

In 2014, secure mass storage and online banking together will only account for 74.2% of sales. In 2014, the total available market for secure USB tokens will be over 150 million units per year, and represent a sales level surpassing EUR 1 billion. As secure USB tokens have a long life expectancy, the over 400 million tokens installed base will be an essential infrastructure the development of new services.

Overview

Secure USB token classification

Secure USB token components

Scope of this report

Threats and security needs

Authentication

Two-factor authentication

OTP

Digital signature

Algorithms and security mode

DES

AES

Public-key cryptography and PKI

Public key certificate

Standards and Certifications

Federal Information Processing Standards (FIPS)

PKCS

MSCAPI

EAL

X.509

OATH

EMV CAP

3-D secure

Global secure USB token market

Market overview

Secure USB token applications

Secure mass-storage

Enterprise security

Online banking

eGovernment

Transport

Customer needs

Issuer

End users

Market triggers

Employee mobility - secure mass-storage

Corporate data protection – enterprise security

Online banking fraud – online banking

Man-in-the-middle attack – online banking

eGovernments needs for authentication - eGovernments

User oriented ticketing services - transport

Market evolution

Technology comparison

Combination with smart card industry

Technology trends

Secure mass storage & enterprise security

Three-factor authentication

Authentication combining with cloud computing

Online banking

Transaction verification and fraud detection

Cross segments multi-application

Token Management System (TMS)

Secure USB token vendors

Market positioning

RSA

Company profile

Products

Aladdin

Company profile

Products

Vasco

Company profile

Products

Entrust

Company profile

Products

Todos

Company profile

Products

Actividentity

Company profile

Products

Neowave

Company profile

Products

Watchdata

Company profile

Products

Gemalto

Company profile

Products

Giesecke & Devrient

Company profile

Products

Feitian technology

Company profile

Products

Sandisk

Company profile

Products

Ironkey

Company profile

Products

ST Electronics Info-Security (DigiSafe)

Company profile

Products

MXI Security

Company profile

Products

RSA

Aladdin

Vasco

Entrust

Todos

ActivIdentity

Neowave

Watchdata

Gemalto

Giesecke & Devrient

Feitian Technology

Sandisk

IronKey

ST Eelctronics Info security

MXI Security

To order this report:

IT_Hosting Industry: Global Secure USB Token Market 2010

Contact Nicolas: [email protected]
US: (805)-652-2626
Intl: +1 805-652-2626

SOURCE Reportlinker

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
WSM International, the pioneer and leader in server migration services, has announced an agreement with WHOA.com, a leader in providing secure public, private and hybrid cloud computing services. Under terms of the agreement, WSM will provide migration services to WHOA.com customers to relocate some or all of their applications, digital assets, and other computing workloads to WHOA.com enterprise-class, secure cloud infrastructure. The migration services include detailed evaluation and planning...
Cloud and datacenter migration innovator AppZero has joined the Microsoft Enterprise Cloud Alliance Program. AppZero is a fast, flexible way to move Windows Server applications from any source machine – physical or virtual – to any destination server, in any cloud or datacenter, using its patented container technology. AppZero’s container is also called a Virtual Application Appliance (VAA). To facilitate Microsoft Azure onboarding, AppZero has two purpose-built offerings: AppZero SP for Azure,...
SYS-CON Events announced today that IceWarp will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IceWarp, the leader of cloud and on-premise messaging, delivers secured email, chat, documents, conferencing and collaboration to today's mobile workforce, all in one unified interface
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
In 2014, the market witnessed a massive migration to the cloud as enterprises finally overcame their fears of the cloud’s viability, security, etc. Over the past 18 months, AWS, Google and Microsoft have waged an ongoing battle through a wave of price cuts and new features. For IT executives, sorting through all the noise to make the best cloud investment decisions has become daunting. Enterprises can and are moving away from a "one size fits all" cloud approach. The new competitive field has ...
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
This Enterprise Strategy Group lab validation report of the NEC Express5800/R320 server with Intel® Xeon® processor presents the benefits of 99.999% uptime NEC fault-tolerant servers that lower overall virtualized server total cost of ownership. This report also includes survey data on the significant costs associated with system outages impacting enterprise and web applications. Click Here to Download Report Now!
Enterprises can achieve rigorous IT security as well as improved DevOps practices and Cloud economics by taking a new, cloud-native approach to application delivery. Because the attack surface for cloud applications is dramatically different than for highly controlled data centers, a disciplined and multi-layered approach that spans all of your processes, staff, vendors and technologies is required. This may sound expensive and time consuming to achieve as you plan how to move selected applicati...
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies leverage disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advance...
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
As more and more data is generated from a variety of connected devices, the need to get insights from this data and predict future behavior and trends is increasingly essential for businesses. Real-time stream processing is needed in a variety of different industries such as Manufacturing, Oil and Gas, Automobile, Finance, Online Retail, Smart Grids, and Healthcare. Azure Stream Analytics is a fully managed distributed stream computation service that provides low latency, scalable processing of ...