封面
市场调查报告书
商品编码
1495966

基于风险的身份验证市场:2024-2029 年预测

Risk-based Authentication Market - Forecasts from 2024 to 2029

出版日期: | 出版商: Knowledge Sourcing Intelligence | 英文 145 Pages | 商品交期: 最快1-2个工作天内

价格
简介目录

2022 年基于风险的认证市场规模为 34.78 亿美元,预计在预测期内复合年增长率为 9.84%,到 2029 年达到 67.07 亿美元。

称为基于风险的身份验证 (RBA) 的安全技术会评估多个变量,以确定与使用者身份和身份验证试验期间的操作相关的风险程度。 RBA 评估设备类型、位置和使用习惯等上下文资料,以评估风险并修改身份验证要求。低风险活动提供流畅的访问,而高风险活动可能需要特殊的身份验证过程,包括多因素身份验证。

透过根据感知的风险等级调整身份验证程序,这种动态方法提高了安全性,同时平衡了安全性和使用者体验。 RBA 广泛应用于电子商务、网路银行和其他数位服务等各个领域,以减少客户在身分验证过程中的摩擦,并减少日益复杂的攻击的可能性。

市场趋势:

最终用户在提高系统安全性方面增加投资正在推动先进技术的采用。安全漏洞发生率的上升也刺激了最终用户的这种需求,推动了基于风险的身份验证解决方案市场的发展。通讯和科技产业的快速成长是推动该市场成长的关键因素,预计在整个预测期内仍将是该市场的主要推动力。

市场驱动因素:

  • 系统安全意识的提高预计将影响基于风险的身份验证市场的成长。

基于风险的身份验证市场成长的主要驱动因素是人们对系统安全性的认识不断增强。基于风险的身份验证系统提供对威胁资料的即时访问,以便用户可以识别潜在的安全风险。基于风险的身份验证的潜在好处包括阻止可疑用户、保护用户资料、减少摩擦以及提高密码安全性。

此外,世界各地对使用网路时的安全性的担忧也在增加。由于隐私外洩和骇客攻击案件不断增加,人们的安全上网意识不断增强。根据世界银行的数据,每百万人拥有的安全网路伺服器数量将从 2019 年的 9,975 台大幅增加到 2020 年的 11,499 台。此外,根据泰雷兹 2022 年资料威胁报告联邦版,49% 的联邦受访者表示遇到了安全漏洞。此外,19% 的人完全知道他们的资料储存在哪里。泰雷兹为美国联邦、私营、州和地方政府机构提供资料保护、存取管理和身分验证。因此,泰雷兹 2022 年资料威胁报告中列出的这些违规行为表明美国的安全威胁不断上升,并有助于基于风险的身份验证市场的成长。

  • 基于风险的身份验证市场的成长预计将受到各个最终用户行业使用量增加的推动。

许多行业(包括通讯和技术、零售、BSFI 和政府医疗保健)中终端用户数量的不断增长以及安全问题的日益严重,正在推动对基于风险的身份验证技术的需求。此外,对科技的便捷存取增加了与远端员工、合作伙伴、承包商和其他外部使用者联繫的需求。因此,最终用户产业需要存取关键资料和系统的用户数量呈指数级增长。

此外,世界各国政府都担心本国的网路安全和资料隐私。例如,2022年7月,比利时外交、对外贸易和发展合作部报告了影响比利时主权、安全和民主的恶意网路活动。该恶意活动针对内部 FPS 和比利时国防。此类事件引起了最终用户的网路安全疑虑。因此,基于风险的身份验证市场预计将在预测期内成长。

市场限制因素:

儘管有许多好处,但基于风险的身份验证 (RBA) 业务在几个方面受到限制。首先,对风险评估演算法的准确性和可靠性的担忧可能会阻碍其广泛部署,因为误报或漏报可能会影响安全有效性和使用者体验。此外,CCPA 和 GDPR 等隐私法对资料处理和收集进行了严格限制,使得严重依赖大量使用者资料的 RBA 系统难以实施。

另一个障碍是与旧系统和当前身份验证架构的整合问题,特别是对于拥有复杂IT基础设施的公司而言。然而,实施和维护 RBA 解决方案的成本(包括员工培训和技术投资)可能感觉不合理,尤其是对于小型组织而言。

北美地区预计将占据市场的主要份额。

依地区划分,分为北美、南美、欧洲、中东/非洲、亚太地区。由于北美地区存在许多市场参与者,基于风险的认证市场预计将成长。

例如,像IBM这样总部位于美国纽约的公司,2021年收益成长3.93%,收益达573.5亿美元。 IBM进一步表示,2021年软体收益将成长5.3%。此外,IBM 以风险为基础的解决方案可透过 IBM Security Trusteer Pinpoint Detect 协助您区分诈骗和真实使用者。北美的这些服务和解决方案正在推动基于风险的身份验证市场的成长。

主要进展:

  • 2023 年 9 月,在 Billington 网路安全高峰会上,安全第一的身份先锋 RSA 宣布扩大对开放式身分验证 (OATH) 开放标准的支援。借助 RSA 的开放标准支援和专有解决方案,政府机构可以遵守 EO 14028、NSM-8、M-22-09 等中概述的关键网路安全义务。
  • 2023 年 4 月,IBM 宣布推出新的安全套件,以简化和加速整个事件生命週期的安全分析师体验。透过对整个产品组合的创新进行大量投资,IBM Security QRadar Suite 实现了 QRadar 品牌的重大发展和扩展,包括所有关键威胁侦测、调查和回应功能。

目录

第一章简介

  • 市场概况
  • 市场定义
  • 调查范围
  • 市场区隔
  • 货币
  • 先决条件
  • 基准年和预测年时间表
  • 相关利益者的主要利益

第二章调查方法

  • 研究设计
  • 调查过程

第三章执行摘要

  • 主要发现
  • 分析师观点

第四章市场动态

  • 市场驱动因素
  • 市场限制因素
  • 波特五力分析
  • 产业价值链分析
  • 分析师观点

第五章基于风险的认证市场:透过提供

  • 介绍
  • 软体
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力
  • 服务
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力

第六章基于风险的认证市场:依公司规模

  • 介绍
  • 小规模
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力
  • 中等大小
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力
  • 规模大
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力

第七章基于风险的认证市场:依应用分类

  • 介绍
  • 云端应用安全
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力
  • 物联网安全
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力
  • 预防诈欺
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力
  • 其他的
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力

第八章以风险为基础的认证市场:依发展划分

  • 介绍
  • 本地
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力

第九章基于风险的认证市场:按最终用户行业

  • 介绍
  • 通讯和技术
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力
  • 零售
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力
  • BFSI
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力
  • 政府
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力
  • 卫生保健
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力
  • 其他的
    • 市场趋势和机会
    • 成长前景
    • 地域获利能力

第10章基于风险的认证市场:按地区

  • 介绍
  • 北美洲
    • 按报价
    • 按公司规模
    • 按用途
    • 按发展
    • 按最终用户产业
    • 按国家/地区
  • 南美洲
    • 按报价
    • 按公司规模
    • 按用途
    • 按发展
    • 按最终用户产业
    • 按国家/地区
  • 欧洲
    • 按报价
    • 按公司规模
    • 按用途
    • 按发展
    • 按最终用户产业
    • 按国家/地区
  • 中东/非洲
    • 按报价
    • 按公司规模
    • 按用途
    • 按发展
    • 按最终用户产业
    • 按国家/地区
  • 亚太地区
    • 按报价
    • 按公司规模
    • 按用途
    • 按发展
    • 按最终用户产业
    • 按国家/地区

第十一章竞争环境及分析

  • 主要企业及策略分析
  • 市场占有率分析
  • 合併、收购、协议和合作
  • 竞赛仪表板

第十二章 公司简介

  • miniOrange Inc.
  • IBM
  • Micro Focus(OpenText)
  • Okta
  • Thales
  • RSA Security
  • LexisNexis Risk Solutions Group(RELX Group)
  • Equifax, Inc.
  • Ping Identity
  • Oracle
  • Broadcom
  • Mitek Systems, Inc
简介目录
Product Code: KSI061612179

The risk-based authentication market was valued at US$3.478 billion in 2022 and is expected to grow at a CAGR of 9.84% over the forecast period to reach a market size of US$6.707 billion by 2029.

A security technique known as risk-based authentication (RBA) assesses several variables to establish the degree of risk related to a user's identity and actions during an authentication attempt. RBA evaluates contextual data, including device kind, location, and usage habits, to evaluate risk and modify authentication requirements. While low-risk activities provide smooth access, high-risk activities could require extra authentication processes, including multi-factor authentication.

By adjusting authentication procedures based on the perceived level of risk, this dynamic method improves security while striking a balance between security and user experience. RBA is extensively used in a variety of sectors, including e-commerce, online banking, and other digital services, to reduce customer friction during authentication procedures and lessen the possibility of increasingly complex assaults.

MARKET TRENDS:

Growing investments by end-users in improving the security of their systems are driving the adoption of advanced technologies by them. The rising incidence of security breaches is further fueling this need among end-users, thus driving the market for risk-based authentication solutions. The rapid growth of the communication and technology industry is a major factor driving the growth of this market, and it is expected to remain a major driving force for this market throughout the forecast period.

MARKET DRIVERS:

  • Increasing system security awareness is expected to influence risk-based authentication market growth.

The major driver in the growth of the risk-based authentication market is increased awareness regarding system security. The risk-based-authentication systems provide real-time access to the threat data which enables the user to identify potential security hazards. The potential benefits of risk-based authentication include blocking suspicious users, protecting user data, reducing friction, improving password security, etc.

Furthermore, the growing security concerns worldwide while using the internet are rising. The rising number of privacy breach cases and hacking instances are increasing awareness regarding secure surfing over the internet. According to the World Bank, the number of secure internet servers per 1 million people was 9,975 in 2019 which significantly grew to 11,499 in 2020. Additionally, the Thales Data Threat Report 2022 -Federal Edition stated that 49% of the federal government respondents had reported that they had experienced a security breach. Furthermore, 19% of them had complete knowledge of where their data was stored. Thales is a provider of data protection, access management, and authentication to the US federal, civilian, state, and local government agencies. Thus, these breaches mentioned in the Thales Data Threat Report 2022 indicated rising security threats in the US which aided the growth of the risk-based authentication market.

  • Rising utilization in various end-user industries is predicted to positively impact risk-based authentication market growth.

The rising end users in industries such as communication and technology, retail, BSFI, government healthcare, and many more are increasing the demand for risk-based authentication technologies owing to the rising security concerns. Furthermore, the rising need for connectivity for remote employees, partners, contractors, and other external users has increased due to easy access to technology. Hence, the volume of users needing access to important data and systems in the end-user industries is growing exponentially.

Moreover, governments all across the world are concerned about cyber security and data privacy in their respective countries. For instance, in July 2022, Belgium's Foreign Affairs, Foreign Trade, and Development Cooperation reported malicious cyber activities that affected the sovereignty, security, and democracy of Belgium. The malicious activities targeted the FPS interior and the Belgian defence. Such incidents are raising concerns among the end-users regarding their cyber security. As a result, the risk-based authentication market is expecting growth in the forecast period.

MARKET RESTRAINTS:

The risk-based authentication (RBA) business is constrained in several ways, despite its advantages. First off, worries about the precision and dependability of risk assessment algorithms can prevent their broad deployment as erroneous positives or negatives could affect security efficacy and user experience. Furthermore, privacy laws like the CCPA and GDPR place stringent restrictions on data processing and gathering, which makes it more difficult to install RBA systems that depend heavily on vast amounts of user data.

Another obstacle is integration issues with old systems and the current authentication architecture, which are especially problematic for enterprises with complex IT infrastructures. However, some organizations, particularly smaller ones, may find the expense of installing and maintaining RBA solutions which includes training staff and making technological investments to be unreasonable.

The North American region is anticipated to hold a significant share of the market.

By geography, the market has been segmented into North America, South America, Europe, the Middle East, Africa, and the Asia Pacific. The North American risk-based authentication market is projected to grow owing to the presence of many market players in the region.

For instance, companies like IBM incorporated in New York, United States recorded a 3.93% revenue increase in 2021, and the company recorded a revenue of US$ 57.35 billion in 2021. IBM further specifies that the Software revenues increased by 5.3% in 2021. Additionally, the risk-based solution offerings by IBM help in differentiating the true users' fraudsters with IBM Security Trusteer Pinpoint Detect. These services and solutions in the North American region are aiding the growth of the risk-based authentication market.

Key Developments:

  • In September 2023, at the Billington CyberSecurity Summit, RSA, the pioneer in security-first identity, announced that it will expand support for the Open Authentication (OATH) open standard. Government agencies can comply with important cybersecurity mandates such as those outlined in EO 14028, NSM-8, and M-22-09, among others by using RSA's open standards support and proprietary solutions.
  • In April 2023, to streamline and expedite the security analyst experience throughout the whole incident lifecycle, IBM launched its new security suite. With a large investment in innovations throughout the portfolio, the IBM Security QRadar Suite offers a substantial development and extension of the QRadar brand, including all key threat detection, investigation, and response capabilities.

Segmentation:

By Offering

  • Software
  • Services

By Enterprise Size

  • Small
  • Medium
  • Large

By Application

  • Cloud Application Security
  • IoT Security
  • Fraud Prevention
  • Others

By Deployment

  • On-premise
  • Cloud

By End-User Industry

  • Communication and Technology
  • Retail
  • BFSI
  • Government
  • Healthcare
  • Others

By Geography

  • North America
  • USA
  • Canada
  • Mexico
  • South America
  • Brazil
  • Argentina
  • Others
  • Europe
  • United Kingdom
  • Germany
  • France
  • Spain
  • Others
  • Middle East and Africa
  • Saudi Arabia
  • UAE
  • Israel
  • Others
  • Asia Pacific
  • China
  • Japan
  • India
  • South Korea
  • Taiwan
  • Thailand
  • Indonesia
  • Others

TABLE OF CONTENTS

1. INTRODUCTION

  • 1.1. Market Overview
  • 1.2. Market Definition
  • 1.3. Scope of the Study
  • 1.4. Market Segmentation
  • 1.5. Currency
  • 1.6. Assumptions
  • 1.7. Base, and Forecast Years Timeline
  • 1.8. Key Benefits for the stakeholder

2. RESEARCH METHODOLOGY

  • 2.1. Research Design
  • 2.2. Research Processes

3. EXECUTIVE SUMMARY

  • 3.1. Key Findings
  • 3.2. Analyst View

4. MARKET DYNAMICS

  • 4.1. Market Drivers
  • 4.2. Market Restraints
  • 4.3. Porter's Five Forces Analysis
    • 4.3.1. Bargaining Power of Suppliers
    • 4.3.2. Bargaining Power of Buyers
    • 4.3.3. Threat of New Entrants
    • 4.3.4. Threat of Substitutes
    • 4.3.5. Competitive Rivalry in the Industry
  • 4.4. Industry Value Chain Analysis
  • 4.5. Analyst View

5. RISK-BASED AUTHENTICATION MARKET, BY OFFERING

  • 5.1. Introduction
  • 5.2. Software
    • 5.2.1. Market Trends and Opportunities
    • 5.2.2. Growth Prospects
    • 5.2.3. Geographic Lucrativeness
  • 5.3. Services
    • 5.3.1. Market Trends and Opportunities
    • 5.3.2. Growth Prospects
    • 5.3.3. Geographic Lucrativeness

6. RISK-BASED AUTHENTICATION MARKET, BY ENTERPRISE SIZE

  • 6.1. Introduction
  • 6.2. Small
    • 6.2.1. Market Trends and Opportunities
    • 6.2.2. Growth Prospects
    • 6.2.3. Geographic Lucrativeness
  • 6.3. Medium
    • 6.3.1. Market Trends and Opportunities
    • 6.3.2. Growth Prospects
    • 6.3.3. Geographic Lucrativeness
  • 6.4. Large
    • 6.4.1. Market Trends and Opportunities
    • 6.4.2. Growth Prospects
    • 6.4.3. Geographic Lucrativeness

7. RISK-BASED AUTHENTICATION MARKET, BY APPLICATION

  • 7.1. Introduction
  • 7.2. Cloud Application Security
    • 7.2.1. Market Trends and Opportunities
    • 7.2.2. Growth Prospects
    • 7.2.3. Geographic Lucrativeness
  • 7.3. IoT Security
    • 7.3.1. Market Trends and Opportunities
    • 7.3.2. Growth Prospects
    • 7.3.3. Geographic Lucrativeness
  • 7.4. Fraud Prevention
    • 7.4.1. Market Trends and Opportunities
    • 7.4.2. Growth Prospects
    • 7.4.3. Geographic Lucrativeness
  • 7.5. Others
    • 7.5.1. Market Trends and Opportunities
    • 7.5.2. Growth Prospects
    • 7.5.3. Geographic Lucrativeness

8. RISK-BASED AUTHENTICATION MARKET, BY DEPLOYMENT

  • 8.1. Introduction
  • 8.2. On-Premise
    • 8.2.1. Market Trends and Opportunities
    • 8.2.2. Growth Prospects
    • 8.2.3. Geographic Lucrativeness
  • 8.3. Cloud
    • 8.3.1. Market Trends and Opportunities
    • 8.3.2. Growth Prospects
    • 8.3.3. Geographic Lucrativeness

9. RISK-BASED AUTHENTICATION MARKET, BY END-USER INDUSTRY

  • 9.1. Introduction
  • 9.2. Communication and Technology
    • 9.2.1. Market Trends and Opportunities
    • 9.2.2. Growth Prospects
    • 9.2.3. Geographic Lucrativeness
  • 9.3. Retail
    • 9.3.1. Market Trends and Opportunities
    • 9.3.2. Growth Prospects
    • 9.3.3. Geographic Lucrativeness
  • 9.4. BFSI
    • 9.4.1. Market Trends and Opportunities
    • 9.4.2. Growth Prospects
    • 9.4.3. Geographic Lucrativeness
  • 9.5. Government
    • 9.5.1. Market Trends and Opportunities
    • 9.5.2. Growth Prospects
    • 9.5.3. Geographic Lucrativeness
  • 9.6. Healthcare
    • 9.6.1. Market Trends and Opportunities
    • 9.6.2. Growth Prospects
    • 9.6.3. Geographic Lucrativeness
  • 9.7. Others
    • 9.7.1. Market Trends and Opportunities
    • 9.7.2. Growth Prospects
    • 9.7.3. Geographic Lucrativeness

10. RISK-BASED AUTHENTICATION MARKET, BY GEOGRAPHY

  • 10.1. Introduction
  • 10.2. North America
    • 10.2.1. By Offering
    • 10.2.2. By Enterprise Size
    • 10.2.3. By Application
    • 10.2.4. By Deployment
    • 10.2.5. By End-User Industry
    • 10.2.6. By Country
      • 10.2.6.1. USA
        • 10.2.6.1.1. Market Trends and Opportunities
        • 10.2.6.1.2. Growth Prospects
      • 10.2.6.2. Canada
        • 10.2.6.2.1. Market Trends and Opportunities
        • 10.2.6.2.2. Growth Prospects
      • 10.2.6.3. Mexico
        • 10.2.6.3.1. Market Trends and Opportunities
        • 10.2.6.3.2. Growth Prospects
  • 10.3. South America
    • 10.3.1. By Offering
    • 10.3.2. By Enterprise Size
    • 10.3.3. By Application
    • 10.3.4. By Deployment
    • 10.3.5. By End-User Industry
    • 10.3.6. By Country
      • 10.3.6.1. Brazil
        • 10.3.6.1.1. Market Trends and Opportunities
        • 10.3.6.1.2. Growth Prospects
      • 10.3.6.2. Argentina
        • 10.3.6.2.1. Market Trends and Opportunities
        • 10.3.6.2.2. Growth Prospects
      • 10.3.6.3. Others
        • 10.3.6.3.1. Market Trends and Opportunities
        • 10.3.6.3.2. Growth Prospects
  • 10.4. Europe
    • 10.4.1. By Offering
    • 10.4.2. By Enterprise Size
    • 10.4.3. By Application
    • 10.4.4. By Deployment
    • 10.4.5. By End-User Industry
    • 10.4.6. By Country
      • 10.4.6.1. United Kingdom
        • 10.4.6.1.1. Market Trends and Opportunities
        • 10.4.6.1.2. Growth Prospects
      • 10.4.6.2. Germany
        • 10.4.6.2.1. Market Trends and Opportunities
        • 10.4.6.2.2. Growth Prospects
      • 10.4.6.3. France
        • 10.4.6.3.1. Market Trends and Opportunities
        • 10.4.6.3.2. Growth Prospects
      • 10.4.6.4. Spain
        • 10.4.6.4.1. Market Trends and Opportunities
        • 10.4.6.4.2. Growth Prospects
      • 10.4.6.5. Others
        • 10.4.6.5.1. Market Trends and Opportunities
        • 10.4.6.5.2. Growth Prospects
  • 10.5. Middle East and Africa
    • 10.5.1. By Offering
    • 10.5.2. By Enterprise Size
    • 10.5.3. By Application
    • 10.5.4. By Deployment
    • 10.5.5. By End-User Industry
    • 10.5.6. By Country
      • 10.5.6.1. Saudi Arabia
        • 10.5.6.1.1. Market Trends and Opportunities
        • 10.5.6.1.2. Growth Prospects
      • 10.5.6.2. UAE
        • 10.5.6.2.1. Market Trends and Opportunities
        • 10.5.6.2.2. Growth Prospects
      • 10.5.6.3. Israel
        • 10.5.6.3.1. Market Trends and Opportunities
        • 10.5.6.3.2. Growth Prospects
      • 10.5.6.4. Others
        • 10.5.6.4.1. Market Trends and Opportunities
        • 10.5.6.4.2. Growth Prospects
  • 10.6. Asia Pacific
    • 10.6.1. By Offering
    • 10.6.2. By Enterprise Size
    • 10.6.3. By Application
    • 10.6.4. By Deployment
    • 10.6.5. By End-User Industry
    • 10.6.6. By Country
      • 10.6.6.1. China
        • 10.6.6.1.1. Market Trends and Opportunities
        • 10.6.6.1.2. Growth Prospects
      • 10.6.6.2. Japan
        • 10.6.6.2.1. Market Trends and Opportunities
        • 10.6.6.2.2. Growth Prospects
      • 10.6.6.3. India
        • 10.6.6.3.1. Market Trends and Opportunities
        • 10.6.6.3.2. Growth Prospects
      • 10.6.6.4. South Korea
        • 10.6.6.4.1. Market Trends and Opportunities
        • 10.6.6.4.2. Growth Prospects
      • 10.6.6.5. Taiwan
        • 10.6.6.5.1. Market Trends and Opportunities
        • 10.6.6.5.2. Growth Prospects
      • 10.6.6.6. Thailand
        • 10.6.6.6.1. Market Trends and Opportunities
        • 10.6.6.6.2. Growth Prospects
      • 10.6.6.7. Indonesia
        • 10.6.6.7.1. Market Trends and Opportunities
        • 10.6.6.7.2. Growth Prospects
      • 10.6.6.8. Others
        • 10.6.6.8.1. Market Trends and Opportunities
        • 10.6.6.8.2. Growth Prospects

11. COMPETITIVE ENVIRONMENT AND ANALYSIS

  • 11.1. Major Players and Strategy Analysis
  • 11.2. Market Share Analysis
  • 11.3. Mergers, Acquisitions, Agreements, and Collaborations
  • 11.4. Competitive Dashboard

12. COMPANY PROFILES

  • 12.1. miniOrange Inc.
  • 12.2. IBM
  • 12.3. Micro Focus (OpenText)
  • 12.4. Okta
  • 12.5. Thales
  • 12.6. RSA Security
  • 12.7. LexisNexis Risk Solutions Group (RELX Group)
  • 12.8. Equifax, Inc.
  • 12.9. Ping Identity
  • 12.10. Oracle
  • 12.11. Broadcom
  • 12.12. Mitek Systems, Inc