Feeds

Web-based single sign-on sales shoot up

ebiz enablement

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Web-based single sign-on (SSO) is emerging as the key driver within the security 3A (authentication, authorisation, and administration) market.

An IDC survey predicts the value of the Western European security 3A software market will increase from $721 million in 2002 to $1.2 billion by the end of 2006, growing around 13 per cent annually over the next four years.

Authentication, authorization, and administration technologies are keys for enterprises to expand trusted relationships with customers, partners, suppliers, and channels across the Web.

Web SSO, a technology that reduces the complexity of managing multiple accounts and passwords, will show compound growth of 33 per cent over the next four years fuelled by spending on identity management products, according to IDC.

Security management is the second-fastest-growing sub-market with year-on-year growth of 21 per cent. IDC says the increased complexity of security infrastructures is driving this growth.

Security 3A software (authentication, authorization, administration) is used for administering security on computer systems or in an enterprise and includes the processes of defining, creating, changing, deleting, and auditing users.

The top five security 3A vendors, according to IDC, are IBM-Tivoli, Computer Associates, Evidian, HP and Entrust.

IDC's report Western European Security 3A Software Forecast, 2001-2006 is available for purchase from local IDC office, or its Web site. ®

Related Stories

Novell pitches Nsure at ID anywhere
UK firm touts alternative to digital certs
Bell Labs simplifies single sign-on
3A security software to boom

Remote control for virtualized desktops

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.