封面
市場調查報告書
商品編碼
1495966

基於風險的身份驗證市場:2024-2029 年預測

Risk-based Authentication Market - Forecasts from 2024 to 2029

出版日期: | 出版商: Knowledge Sourcing Intelligence | 英文 145 Pages | 商品交期: 最快1-2個工作天內

價格
簡介目錄

2022 年基於風險的認證市場規模為 34.78 億美元,預計在預測期內複合年成長率為 9.84%,到 2029 年達到 67.07 億美元。

稱為基於風險的身份驗證 (RBA) 的安全技術會評估多個變量,以確定與使用者身份和身份驗證試驗期間的操作相關的風險程度。 RBA 評估設備類型、位置和使用習慣等上下文資料,以評估風險並修改身份驗證要求。低風險活動提供流暢的訪問,而高風險活動可能需要特殊的身份驗證過程,包括多因素身份驗證。

透過根據感知的風險等級調整身份驗證程序,這種動態方法提高了安全性,同時平衡了安全性和使用者體驗。 RBA 廣泛應用於電子商務、網路銀行和其他數位服務等各個領域,以減少客戶在身分驗證過程中的摩擦,並減少日益複雜的攻擊的可能性。

市場趨勢:

最終用戶在提高系統安全性方面增加投資正在推動先進技術的採用。安全漏洞發生率的上升也刺激了最終用戶的這種需求,推動了基於風險的身份驗證解決方案市場的發展。通訊和科技產業的快速成長是推動該市場成長的關鍵因素,預計在整個預測期內仍將是該市場的主要推動力。

市場促進因素:

  • 系統安全意識的提高預計將影響基於風險的身份驗證市場的成長。

基於風險的身份驗證市場成長的主要促進因素是人們對系統安全性的認知不斷增強。基於風險的身份驗證系統提供對威脅資料的即時訪問,以便用戶可以識別潛在的安全風險。基於風險的身份驗證的潛在好處包括阻止可疑用戶、保護用戶資料、減少摩擦以及提高密碼安全性。

此外,世界各地對使用網路時的安全性的擔憂也在增加。由於隱私外洩和駭客攻擊案件不斷增加,人們的安全上網意識不斷增強。根據世界銀行的數據,每百萬人擁有的安全網路伺服器數量將從 2019 年的 9,975 台大幅增加到 2020 年的 11,499 台。此外,根據泰雷茲 2022 年資料威脅報告聯邦版,49% 的聯邦受訪者表示遇到了安全漏洞。此外,19% 的人完全知道他們的資料儲存在哪裡。泰雷茲為美國聯邦、私營、州和地方政府機構提供資料保護、存取管理和身分驗證。因此,泰雷茲 2022 年資料威脅報告中列出的這些違規行為表明美國的安全威脅不斷上升,並有助於基於風險的身份驗證市場的成長。

  • 基於風險的身份驗證市場的成長預計將受到各個最終用戶行業使用量增加的推動。

許多行業(包括通訊和技術、零售、BSFI 和政府醫療保健)中終端用戶數量的不斷成長以及安全問題的日益嚴重,正在推動對基於風險的身份驗證技術的需求。此外,對科技的便捷存取增加了與遠端員工、合作夥伴、承包商和其他外部使用者聯繫的需求。因此,最終用戶產業需要存取關鍵資料和系統的用戶數量呈指數級成長。

此外,世界各國政府都擔心本國的網路安全和資料隱私。例如,2022年7月,比利時外交、對外貿易和發展合作部報告了影響比利時主權、安全和民主的惡意網路活動。該惡意活動針對內部 FPS 和比利時國防。此類事件引起了最終用戶的網路安全疑慮。因此,基於風險的身份驗證市場預計將在預測期內成長。

市場限制因素:

儘管有許多好處,但基於風險的身份驗證 (RBA) 業務在幾個方面受到限制。首先,對風險評估演算法的準確性和可靠性的擔憂可能會阻礙其廣泛部署,因為誤報或漏報可能會影響安全有效性和使用者體驗。此外,CCPA 和 GDPR 等隱私法對資料處理和收集進行了嚴格限制,使得嚴重依賴大量使用者資料的 RBA 系統難以實施。

另一個障礙是與舊系統和當前身份驗證架構的整合問題,特別是對於擁有複雜IT基礎設施的公司而言。然而,實施和維護 RBA 解決方案的成本(包括員工培訓和技術投資)可能感覺不合理,尤其是對於小型組織而言。

北美地區預計將佔據市場的主要佔有率。

依地區分類,分為北美、南美、歐洲、中東/非洲、亞太地區。由於北美地區存在許多市場參與者,基於風險的認證市場預計將成長。

例如,像IBM這樣總部位於美國紐約的公司,2021年收益成長3.93%,收益達573.5億美元。 IBM進一步表示,2021年軟體收益將成長5.3%。此外,IBM 以風險為基礎的解決方案可透過 IBM Security Trusteer Pinpoint Detect 協助您區分詐騙和真實使用者。北美的這些服務和解決方案正在推動基於風險的身份驗證市場的成長。

主要進展:

  • 2023 年 9 月,在 Billington 網路安全高峰會上,安全第一的身份先鋒 RSA 宣布擴大對開放式身分驗證 (OATH) 開放標準的支援。借助 RSA 的開放標準支援和專有解決方案,政府機構可以遵守 EO 14028、NSM-8、M-22-09 等中概述的關鍵網路安全義務。
  • 2023 年 4 月,IBM 宣布推出新的安全套件,以簡化和加速整個事件生命週期的安全分析師體驗。透過對整個產品組合的創新進行大量投資,IBM Security QRadar Suite 實現了 QRadar 品牌的重大發展和擴展,包括所有關鍵威脅偵測、調查和回應功能。

目錄

第1章簡介

  • 市場概況
  • 市場定義
  • 調查範圍
  • 市場區隔
  • 貨幣
  • 先決條件
  • 基準年和預測年時間表
  • 相關利益者的主要利益

第2章調查方法

  • 研究設計
  • 調查過程

第3章執行摘要

  • 主要發現
  • 分析師觀點

第4章市場動態

  • 市場促進因素
  • 市場限制因素
  • 波特五力分析
  • 產業價值鏈分析
  • 分析師觀點

第5章基於風險的認證市場:透過提供

  • 介紹
  • 軟體
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力
  • 服務
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力

第6章基於風險的認證市場:依公司規模

  • 介紹
  • 小規模
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力
  • 中等大小
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力
  • 規模大
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力

第7章基於風險的認證市場:依應用分類

  • 介紹
  • 雲端應用安全
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力
  • 物聯網安全
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力
  • 預防詐欺
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力
  • 其他
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力

第8章以風險為基礎的認證市場:依發展分類

  • 介紹
  • 本地
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力

第9章基於風險的認證市場:按最終用戶行業

  • 介紹
  • 通訊和技術
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力
  • 零售
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力
  • BFSI
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力
  • 政府
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力
  • 衛生保健
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力
  • 其他
    • 市場趨勢和機遇
    • 成長前景
    • 地域獲利能力

第10章基於風險的認證市場:按地區

  • 介紹
  • 北美洲
    • 按報價
    • 按公司規模
    • 按用途
    • 按發展
    • 按最終用戶產業
    • 按國家/地區
  • 南美洲
    • 按報價
    • 按公司規模
    • 按用途
    • 按發展
    • 按最終用戶產業
    • 按國家/地區
  • 歐洲
    • 按報價
    • 按公司規模
    • 按用途
    • 按發展
    • 按最終用戶產業
    • 按國家/地區
  • 中東/非洲
    • 按報價
    • 按公司規模
    • 按用途
    • 按發展
    • 按最終用戶產業
    • 按國家/地區
  • 亞太地區
    • 按報價
    • 按公司規模
    • 按用途
    • 按發展
    • 按最終用戶產業
    • 按國家/地區

第11章競爭環境及分析

  • 主要企業及策略分析
  • 市場佔有率分析
  • 合併、收購、協議和合作
  • 競賽儀表板

第12章 公司簡介

  • miniOrange Inc.
  • IBM
  • Micro Focus(OpenText)
  • Okta
  • Thales
  • RSA Security
  • LexisNexis Risk Solutions Group(RELX Group)
  • Equifax, Inc.
  • Ping Identity
  • Oracle
  • Broadcom
  • Mitek Systems, Inc
簡介目錄
Product Code: KSI061612179

The risk-based authentication market was valued at US$3.478 billion in 2022 and is expected to grow at a CAGR of 9.84% over the forecast period to reach a market size of US$6.707 billion by 2029.

A security technique known as risk-based authentication (RBA) assesses several variables to establish the degree of risk related to a user's identity and actions during an authentication attempt. RBA evaluates contextual data, including device kind, location, and usage habits, to evaluate risk and modify authentication requirements. While low-risk activities provide smooth access, high-risk activities could require extra authentication processes, including multi-factor authentication.

By adjusting authentication procedures based on the perceived level of risk, this dynamic method improves security while striking a balance between security and user experience. RBA is extensively used in a variety of sectors, including e-commerce, online banking, and other digital services, to reduce customer friction during authentication procedures and lessen the possibility of increasingly complex assaults.

MARKET TRENDS:

Growing investments by end-users in improving the security of their systems are driving the adoption of advanced technologies by them. The rising incidence of security breaches is further fueling this need among end-users, thus driving the market for risk-based authentication solutions. The rapid growth of the communication and technology industry is a major factor driving the growth of this market, and it is expected to remain a major driving force for this market throughout the forecast period.

MARKET DRIVERS:

  • Increasing system security awareness is expected to influence risk-based authentication market growth.

The major driver in the growth of the risk-based authentication market is increased awareness regarding system security. The risk-based-authentication systems provide real-time access to the threat data which enables the user to identify potential security hazards. The potential benefits of risk-based authentication include blocking suspicious users, protecting user data, reducing friction, improving password security, etc.

Furthermore, the growing security concerns worldwide while using the internet are rising. The rising number of privacy breach cases and hacking instances are increasing awareness regarding secure surfing over the internet. According to the World Bank, the number of secure internet servers per 1 million people was 9,975 in 2019 which significantly grew to 11,499 in 2020. Additionally, the Thales Data Threat Report 2022 -Federal Edition stated that 49% of the federal government respondents had reported that they had experienced a security breach. Furthermore, 19% of them had complete knowledge of where their data was stored. Thales is a provider of data protection, access management, and authentication to the US federal, civilian, state, and local government agencies. Thus, these breaches mentioned in the Thales Data Threat Report 2022 indicated rising security threats in the US which aided the growth of the risk-based authentication market.

  • Rising utilization in various end-user industries is predicted to positively impact risk-based authentication market growth.

The rising end users in industries such as communication and technology, retail, BSFI, government healthcare, and many more are increasing the demand for risk-based authentication technologies owing to the rising security concerns. Furthermore, the rising need for connectivity for remote employees, partners, contractors, and other external users has increased due to easy access to technology. Hence, the volume of users needing access to important data and systems in the end-user industries is growing exponentially.

Moreover, governments all across the world are concerned about cyber security and data privacy in their respective countries. For instance, in July 2022, Belgium's Foreign Affairs, Foreign Trade, and Development Cooperation reported malicious cyber activities that affected the sovereignty, security, and democracy of Belgium. The malicious activities targeted the FPS interior and the Belgian defence. Such incidents are raising concerns among the end-users regarding their cyber security. As a result, the risk-based authentication market is expecting growth in the forecast period.

MARKET RESTRAINTS:

The risk-based authentication (RBA) business is constrained in several ways, despite its advantages. First off, worries about the precision and dependability of risk assessment algorithms can prevent their broad deployment as erroneous positives or negatives could affect security efficacy and user experience. Furthermore, privacy laws like the CCPA and GDPR place stringent restrictions on data processing and gathering, which makes it more difficult to install RBA systems that depend heavily on vast amounts of user data.

Another obstacle is integration issues with old systems and the current authentication architecture, which are especially problematic for enterprises with complex IT infrastructures. However, some organizations, particularly smaller ones, may find the expense of installing and maintaining RBA solutions which includes training staff and making technological investments to be unreasonable.

The North American region is anticipated to hold a significant share of the market.

By geography, the market has been segmented into North America, South America, Europe, the Middle East, Africa, and the Asia Pacific. The North American risk-based authentication market is projected to grow owing to the presence of many market players in the region.

For instance, companies like IBM incorporated in New York, United States recorded a 3.93% revenue increase in 2021, and the company recorded a revenue of US$ 57.35 billion in 2021. IBM further specifies that the Software revenues increased by 5.3% in 2021. Additionally, the risk-based solution offerings by IBM help in differentiating the true users' fraudsters with IBM Security Trusteer Pinpoint Detect. These services and solutions in the North American region are aiding the growth of the risk-based authentication market.

Key Developments:

  • In September 2023, at the Billington CyberSecurity Summit, RSA, the pioneer in security-first identity, announced that it will expand support for the Open Authentication (OATH) open standard. Government agencies can comply with important cybersecurity mandates such as those outlined in EO 14028, NSM-8, and M-22-09, among others by using RSA's open standards support and proprietary solutions.
  • In April 2023, to streamline and expedite the security analyst experience throughout the whole incident lifecycle, IBM launched its new security suite. With a large investment in innovations throughout the portfolio, the IBM Security QRadar Suite offers a substantial development and extension of the QRadar brand, including all key threat detection, investigation, and response capabilities.

Segmentation:

By Offering

  • Software
  • Services

By Enterprise Size

  • Small
  • Medium
  • Large

By Application

  • Cloud Application Security
  • IoT Security
  • Fraud Prevention
  • Others

By Deployment

  • On-premise
  • Cloud

By End-User Industry

  • Communication and Technology
  • Retail
  • BFSI
  • Government
  • Healthcare
  • Others

By Geography

  • North America
  • USA
  • Canada
  • Mexico
  • South America
  • Brazil
  • Argentina
  • Others
  • Europe
  • United Kingdom
  • Germany
  • France
  • Spain
  • Others
  • Middle East and Africa
  • Saudi Arabia
  • UAE
  • Israel
  • Others
  • Asia Pacific
  • China
  • Japan
  • India
  • South Korea
  • Taiwan
  • Thailand
  • Indonesia
  • Others

TABLE OF CONTENTS

1. INTRODUCTION

  • 1.1. Market Overview
  • 1.2. Market Definition
  • 1.3. Scope of the Study
  • 1.4. Market Segmentation
  • 1.5. Currency
  • 1.6. Assumptions
  • 1.7. Base, and Forecast Years Timeline
  • 1.8. Key Benefits for the stakeholder

2. RESEARCH METHODOLOGY

  • 2.1. Research Design
  • 2.2. Research Processes

3. EXECUTIVE SUMMARY

  • 3.1. Key Findings
  • 3.2. Analyst View

4. MARKET DYNAMICS

  • 4.1. Market Drivers
  • 4.2. Market Restraints
  • 4.3. Porter's Five Forces Analysis
    • 4.3.1. Bargaining Power of Suppliers
    • 4.3.2. Bargaining Power of Buyers
    • 4.3.3. Threat of New Entrants
    • 4.3.4. Threat of Substitutes
    • 4.3.5. Competitive Rivalry in the Industry
  • 4.4. Industry Value Chain Analysis
  • 4.5. Analyst View

5. RISK-BASED AUTHENTICATION MARKET, BY OFFERING

  • 5.1. Introduction
  • 5.2. Software
    • 5.2.1. Market Trends and Opportunities
    • 5.2.2. Growth Prospects
    • 5.2.3. Geographic Lucrativeness
  • 5.3. Services
    • 5.3.1. Market Trends and Opportunities
    • 5.3.2. Growth Prospects
    • 5.3.3. Geographic Lucrativeness

6. RISK-BASED AUTHENTICATION MARKET, BY ENTERPRISE SIZE

  • 6.1. Introduction
  • 6.2. Small
    • 6.2.1. Market Trends and Opportunities
    • 6.2.2. Growth Prospects
    • 6.2.3. Geographic Lucrativeness
  • 6.3. Medium
    • 6.3.1. Market Trends and Opportunities
    • 6.3.2. Growth Prospects
    • 6.3.3. Geographic Lucrativeness
  • 6.4. Large
    • 6.4.1. Market Trends and Opportunities
    • 6.4.2. Growth Prospects
    • 6.4.3. Geographic Lucrativeness

7. RISK-BASED AUTHENTICATION MARKET, BY APPLICATION

  • 7.1. Introduction
  • 7.2. Cloud Application Security
    • 7.2.1. Market Trends and Opportunities
    • 7.2.2. Growth Prospects
    • 7.2.3. Geographic Lucrativeness
  • 7.3. IoT Security
    • 7.3.1. Market Trends and Opportunities
    • 7.3.2. Growth Prospects
    • 7.3.3. Geographic Lucrativeness
  • 7.4. Fraud Prevention
    • 7.4.1. Market Trends and Opportunities
    • 7.4.2. Growth Prospects
    • 7.4.3. Geographic Lucrativeness
  • 7.5. Others
    • 7.5.1. Market Trends and Opportunities
    • 7.5.2. Growth Prospects
    • 7.5.3. Geographic Lucrativeness

8. RISK-BASED AUTHENTICATION MARKET, BY DEPLOYMENT

  • 8.1. Introduction
  • 8.2. On-Premise
    • 8.2.1. Market Trends and Opportunities
    • 8.2.2. Growth Prospects
    • 8.2.3. Geographic Lucrativeness
  • 8.3. Cloud
    • 8.3.1. Market Trends and Opportunities
    • 8.3.2. Growth Prospects
    • 8.3.3. Geographic Lucrativeness

9. RISK-BASED AUTHENTICATION MARKET, BY END-USER INDUSTRY

  • 9.1. Introduction
  • 9.2. Communication and Technology
    • 9.2.1. Market Trends and Opportunities
    • 9.2.2. Growth Prospects
    • 9.2.3. Geographic Lucrativeness
  • 9.3. Retail
    • 9.3.1. Market Trends and Opportunities
    • 9.3.2. Growth Prospects
    • 9.3.3. Geographic Lucrativeness
  • 9.4. BFSI
    • 9.4.1. Market Trends and Opportunities
    • 9.4.2. Growth Prospects
    • 9.4.3. Geographic Lucrativeness
  • 9.5. Government
    • 9.5.1. Market Trends and Opportunities
    • 9.5.2. Growth Prospects
    • 9.5.3. Geographic Lucrativeness
  • 9.6. Healthcare
    • 9.6.1. Market Trends and Opportunities
    • 9.6.2. Growth Prospects
    • 9.6.3. Geographic Lucrativeness
  • 9.7. Others
    • 9.7.1. Market Trends and Opportunities
    • 9.7.2. Growth Prospects
    • 9.7.3. Geographic Lucrativeness

10. RISK-BASED AUTHENTICATION MARKET, BY GEOGRAPHY

  • 10.1. Introduction
  • 10.2. North America
    • 10.2.1. By Offering
    • 10.2.2. By Enterprise Size
    • 10.2.3. By Application
    • 10.2.4. By Deployment
    • 10.2.5. By End-User Industry
    • 10.2.6. By Country
      • 10.2.6.1. USA
        • 10.2.6.1.1. Market Trends and Opportunities
        • 10.2.6.1.2. Growth Prospects
      • 10.2.6.2. Canada
        • 10.2.6.2.1. Market Trends and Opportunities
        • 10.2.6.2.2. Growth Prospects
      • 10.2.6.3. Mexico
        • 10.2.6.3.1. Market Trends and Opportunities
        • 10.2.6.3.2. Growth Prospects
  • 10.3. South America
    • 10.3.1. By Offering
    • 10.3.2. By Enterprise Size
    • 10.3.3. By Application
    • 10.3.4. By Deployment
    • 10.3.5. By End-User Industry
    • 10.3.6. By Country
      • 10.3.6.1. Brazil
        • 10.3.6.1.1. Market Trends and Opportunities
        • 10.3.6.1.2. Growth Prospects
      • 10.3.6.2. Argentina
        • 10.3.6.2.1. Market Trends and Opportunities
        • 10.3.6.2.2. Growth Prospects
      • 10.3.6.3. Others
        • 10.3.6.3.1. Market Trends and Opportunities
        • 10.3.6.3.2. Growth Prospects
  • 10.4. Europe
    • 10.4.1. By Offering
    • 10.4.2. By Enterprise Size
    • 10.4.3. By Application
    • 10.4.4. By Deployment
    • 10.4.5. By End-User Industry
    • 10.4.6. By Country
      • 10.4.6.1. United Kingdom
        • 10.4.6.1.1. Market Trends and Opportunities
        • 10.4.6.1.2. Growth Prospects
      • 10.4.6.2. Germany
        • 10.4.6.2.1. Market Trends and Opportunities
        • 10.4.6.2.2. Growth Prospects
      • 10.4.6.3. France
        • 10.4.6.3.1. Market Trends and Opportunities
        • 10.4.6.3.2. Growth Prospects
      • 10.4.6.4. Spain
        • 10.4.6.4.1. Market Trends and Opportunities
        • 10.4.6.4.2. Growth Prospects
      • 10.4.6.5. Others
        • 10.4.6.5.1. Market Trends and Opportunities
        • 10.4.6.5.2. Growth Prospects
  • 10.5. Middle East and Africa
    • 10.5.1. By Offering
    • 10.5.2. By Enterprise Size
    • 10.5.3. By Application
    • 10.5.4. By Deployment
    • 10.5.5. By End-User Industry
    • 10.5.6. By Country
      • 10.5.6.1. Saudi Arabia
        • 10.5.6.1.1. Market Trends and Opportunities
        • 10.5.6.1.2. Growth Prospects
      • 10.5.6.2. UAE
        • 10.5.6.2.1. Market Trends and Opportunities
        • 10.5.6.2.2. Growth Prospects
      • 10.5.6.3. Israel
        • 10.5.6.3.1. Market Trends and Opportunities
        • 10.5.6.3.2. Growth Prospects
      • 10.5.6.4. Others
        • 10.5.6.4.1. Market Trends and Opportunities
        • 10.5.6.4.2. Growth Prospects
  • 10.6. Asia Pacific
    • 10.6.1. By Offering
    • 10.6.2. By Enterprise Size
    • 10.6.3. By Application
    • 10.6.4. By Deployment
    • 10.6.5. By End-User Industry
    • 10.6.6. By Country
      • 10.6.6.1. China
        • 10.6.6.1.1. Market Trends and Opportunities
        • 10.6.6.1.2. Growth Prospects
      • 10.6.6.2. Japan
        • 10.6.6.2.1. Market Trends and Opportunities
        • 10.6.6.2.2. Growth Prospects
      • 10.6.6.3. India
        • 10.6.6.3.1. Market Trends and Opportunities
        • 10.6.6.3.2. Growth Prospects
      • 10.6.6.4. South Korea
        • 10.6.6.4.1. Market Trends and Opportunities
        • 10.6.6.4.2. Growth Prospects
      • 10.6.6.5. Taiwan
        • 10.6.6.5.1. Market Trends and Opportunities
        • 10.6.6.5.2. Growth Prospects
      • 10.6.6.6. Thailand
        • 10.6.6.6.1. Market Trends and Opportunities
        • 10.6.6.6.2. Growth Prospects
      • 10.6.6.7. Indonesia
        • 10.6.6.7.1. Market Trends and Opportunities
        • 10.6.6.7.2. Growth Prospects
      • 10.6.6.8. Others
        • 10.6.6.8.1. Market Trends and Opportunities
        • 10.6.6.8.2. Growth Prospects

11. COMPETITIVE ENVIRONMENT AND ANALYSIS

  • 11.1. Major Players and Strategy Analysis
  • 11.2. Market Share Analysis
  • 11.3. Mergers, Acquisitions, Agreements, and Collaborations
  • 11.4. Competitive Dashboard

12. COMPANY PROFILES

  • 12.1. miniOrange Inc.
  • 12.2. IBM
  • 12.3. Micro Focus (OpenText)
  • 12.4. Okta
  • 12.5. Thales
  • 12.6. RSA Security
  • 12.7. LexisNexis Risk Solutions Group (RELX Group)
  • 12.8. Equifax, Inc.
  • 12.9. Ping Identity
  • 12.10. Oracle
  • 12.11. Broadcom
  • 12.12. Mitek Systems, Inc