суббота, 25 февраля 2012 г.

Research and Markets: Online and Mobile Device Identification: Is Your Online Authentication Security Strategy Ready to Go Mobile?

DUBLIN -- Research and Markets (http://www.researchandmarkets.com/research/94fcf1/online_and_mobile) has announced the addition of Javelin Strategy & Research's new report "Online and Mobile Device Identification: Is Your Online Authentication Security Strategy Ready to Go Mobile?" to their offering.

Device identification is a relatively inexpensive authentication process that provides a low to medium layer of protection with high ease of use for consumers. But is this online security strategy ready to go mobile? In this report, Javelin reviews the advantages and disadvantages of device identification and its ability to extend from online to mobile authentication. The need for better account authentication in financial services, retail, medical, social networks and gaming is urgent and growing. While mobile threats are still nascent, online attacks on nationwide financial institutions are increasing. At the same time, more consumers are purchasing smartphones and are also connecting to online and mobile sites through their mobile devices. Security vendors reviewed are Digital Resolve, 41st Parameter, Iovation, RSA and ThreatMetrix.

Primary Questions

* Why is there a need for a passive layer of security, such as device identification?

* What online authentication methods transfer to mobile authentication?

* What are the advantages and disadvantages of device identification?

* Will device identification work with mobile handsets?

* How does device identification help thwart criminal attacks and identify true customers?

* Which vendors supply digital identification? How are they differentiated?

Key Topics Covered:

* Overview

* Primary Questions

* Methodology

* Executive Summary

* Urgent Need for Better Authentication

* More Online Fraud and Sophisticated Attacks

* Shift in Attacks to National Financial Institutions

* Decline in Consumers Faith in Online Banking Protection

* Proliferation of Mobile Devices

* Growth of Mobile Banking

* Not Enough Security

* Authentication: A Two-Step Process

* Medium Security with High Ease of Use Through Device Recognition

* Planning for Mobile Security

* WiFi vs. Cellular Internet Access

* Smartphone-Based Mobile vs. Online Banking

* Authentication System Overview

* Sources of Account Holder Information

* Static vs. Dynamic Information

* Table of Figures

* Companies Mentioned

For more information visit http://www.researchandmarkets.com/research/94fcf1/online_and_mobile

Комментариев нет:

Отправить комментарий