PKI (public key infrastructure) market of Russia
Implementation of PKI allows to solve a wide range of tasks from security of transactions in mobile banking and protection of e-mail, before establishment of reliable time of creation of the document. The splash in interest in digital certificates and technologies of data protection, such as protocol of secure sockets (secure sockets layer, SSL) and a public key infrastructure (public key infrastructure, PKI) is caused by increase in number of cases of theft of data and uses of vulnerabilities of cryptographic mechanisms.
- you Look also SSL
Content |
2018
As the public key infrastructure (PKI) helps to tsifrovizirovat business
Failure from paper for benefit of electronic document management — a world trend. In Russia it is not obligatory yet, but seriously simplifies life. Besides, without it it is difficult to imagine the digital future. How to pass to electronic documents how to make exchange by them of safer and in what distinctions of profile solutions – in article of the expert of Gazinformservice company Tatiana Stankievich. Read in more detail
2013
The international consulting company Frost & Sullivan provided in the summer of 2014 results of a research "The world markets of certificates: a public key infrastructure" (Global Certificates Markets — A Focus on Public Key Infrastructure). According to analysts, distribution of technologies of digital identification creates steady global demand for certificates of PKI. Also mobile electronic signatures become a standard rule.
According to the report of Frost & Sullivan, in 2013 the total revenue of the enterprises in this market was $357.4 million, and by 2017, according to forecasts, will reach $532.8 million. The greatest share in revenue breakdown will fall on public sector that is connected with implementation by these customers of a number of the projects connected with identity certificates.
According to data of a research of Code of Security company, in 2013 the state departments spent about 4.8% of the IT budgets for protection of information resources. From them about 12% were the share of solutions of the class IDM/PKI/SSO which provide effective management of access to the state information resources.
Growth of number of mobile devices as analysts of Frost & Sullivan note, leads to emergence of new models of use of technologies. In Russia, according to players of the market, among such high-quality changes it is necessary to select expansion of use of PKI for mobile document flow, electronic marketplaces, specialized mobile automated workplaces and so forth. Mobile electronic signatures become a part of the standard offer of certification centers. Customers aim to have one set
SKP EDS for a classical and mobile operation mode. All it in general, aggravates need of identification of users, devices and transactions. As a result demand for the systems of identification on the basis of public keys grows.
As note in the company, before many organizations did not see practical benefits in implementation of a public key infrastructure. At that time there were few applications compatible to this technology owing to what the organizations and government agencies which used PKI faced different problems. Improvement of quality of the PKI platforms and the connected services affected in a positive side the market potential of this infrastructure
Despite existence of huge opportunities for growth in the world market, availability of newer technologies of data protection narrows a scope of a public key infrastructure. Besides, not any cross-platform software requires use of strict authentication. Need of development of strategy of change management is also an obstacle for active and widespread introduction of a public key infrastructure. Interests customers, their investments, what hidden expenses on management of certificates what lifecycle of the solution and what form factors are supported by this infrastructure how fast will pay off.
The suppliers of certificates capable to provide an investment payback, including the hidden expenses and also capable to support different devices, security requirements, scenarios of use, have the best chances to win "fight for the client"