Providing market intelligence for more than 35 years

In The News

The Future of Entertainment Services Authentication

A leading area of innovation is in adaptive authentication. This technology determines the level of authentication needed for a given interaction with a service. So, each interaction comes with a specified level of authentication that best fits the level of the transaction, balancing effective security with degree of inconvenience for users.

With adaptive authentication, each interaction with a device and service is effectively graded for its normalcy, based on prior user behavior. Data points like geography, time, and watching behavior are taken into consideration to determine this grade. Grading ensures that interactions that need a high level of security receive it while routine interactions allow users a frictionless experience.

From the article "The Future of Entertainment Services Authentication" by Brett Sappington.

Previously In The News

Legrand Launches Plug-In Level 2 Home EV Charger, Hardwired Model to Follow

In a separate article CE Pro wrote discussing current trends in home energy management, a representative of Parks Associates stated that this lack of infrastructure, compounded with the current work f...

Amazon Touts JustWatch Report Saying It Beat Netflix in Q2 Engagement ... 'Take Our Market Share Data With a Grain of Salt,' Responds JustWatch's Founder

Amazon doesn't publicly disclose how many Amazon Prime members it is the U.S., or globally for that matter. But late last year, research company Parks Associates published data suggesting that Prime V...

Smart Lighting Adoption Surges Among US Internet Households

New research from Parks Associates reveals a surge in smart lighting adoption among US internet households, with 13% using smart light bulbs and 6% employing smart lighting control systems. Parks A...

Are Consumers Right to Fear Connected Home Products?

According to a recent whitepaper by Parks Associates, “72 percent of smart home product owners are concerned with the security of personal data collected by their devices.” From the article, "Are C...