Gemalto is now part of the Thales Group, find out more.
Skip to content
Gemalto: Security to be free
Our blogs: Conversations around digital security
Search
Back to articles
  • Home
  • Mobile
  • Enterprise Security
  • IoT
  • Financial Services
  • Government
  • Software Monetization
  • Featured Bloggers
    • Gemalto (504)
    • Manfred Kube (112)
    • Tim Cawsey (83)
    • Jennifer Dean (62)
    • Marta Bordonada (59)
    • Rémi de Fouchier (53)
    • Arta Sylejmani (41)
    • Mor Ahuvia (39)
    • Dominique Brulé (38)
    • Philippe Benitez (37)
    • Jason Hart (34)
    • Didier Benkoel-Adechy (30)
    • Maria Barbieri (29)
    • Kristel Teyras (23)
    • Xavier Larduinat (21)
    • Haider Iqbal (21)
    • Frederic Martinez (20)
    • Neville Pattinson (20)
    • Sebastien Violette (20)
    • John Ahlberg (19)
    • Ken Abbott (19)
    • Sophie Bessin-Py (18)
    • Brittany Jedrzejewski (17)
    • Juana Catalina Rodriguez (15)
    • Nicole Williams (14)
    • Isabelle Lodo (13)
    • Ronni Kives (12)
    • Jennifer Hindle (12)
    • Sek Leong (12)
    • Sharon Ginga (10)

    Latest blog posts by:

    • Ken AbbottKen Abbott
    • Maria BarbieriMaria Barbieri
    • Mor AhuviaMor Ahuvia
    • Juana Catalina RodriguezJuana Catalina Rodriguez
    • Philippe BenitezPhilippe Benitez
    • Didier Benkoel-AdechyDidier Benkoel-Adechy
    See all bloggers
  • Blogroll
    • Amrit Williams blog
    • Communities Dominate Brands
    • GoMo News
    • HIT Consultant
    • ID Theft Security
    • Independent Identity
    • Kantara Initiative
    • Krebs on Security
    • Life as a Healthcare CIO
    • Michael N. Dundas
    • Mobile Marketer Blog
    • Mobile Marketing Watch
    • Mobile Money Asia
    • Mobile Zeitgeist
    • MSearchGroove (MSG)
    • Musings of a mobile marketer
    • Naked Security
    • Network Security Blog
    • NFC World
    • RFID Journal
    • Ric Ferraro's Blog
    • Schneier on Security
    • SecDev
    • Security Nirvana
    • Virginia Benedict
  • Countries
    • Brazil
    • China
    • France
    • Germany
    • Italy
    • Japan
    • Kenya
    • South Korea
    • Spain
    • Turkey
    • UK
    • US
  • Tags
    • Apple
    • Authentication
    • BYOD
    • Banking
    • Biometrics
    • Cloud
    • Connected devices
    • Contactless
    • Convenience
    • Cybersecurity
    • Data breach
    • Digital Security
    • EMV
    • Ebanking
    • Encryption
    • Facebook
    • Fraud
    • Gemalto
    • IOT
    • Identity
    • Innovation
    • Internet of things
    • LTE
    • M2M
    • MWC
    • Machine-to-machine
    • MasterCard
    • Mobile wallet
    • Mobile marketing
    • Mobile
    • Mobile payment
    • Mobile payments
    • Mobile World Congress
    • Multi-factor authentication
    • NFC
    • OTP
    • Online banking
    • Password
    • Passwords
    • Payments
    • SIM
    • SMS
    • Security
    • Smartphone
    • Strong authentication
    • Technology
    • Trust
    • Two factor authentication
    • USA
    • Visa
Back to articles

Posted on 07 September 2011 by John Lineberger in Enterprise Security

Securing Gamer Accounts and Online Assets

Last updated: 21 March 2014

My final installment in this series features the security of a player’s online persona or assets. If you’ve ever played a game that involves accomplishments or accumulating items, you know how much you care about this layer of security.  No one wants to wake up one morning, log in to World of Warcraft and find all of his precious epics disenchanted. Some games have better customer service than others, but correcting the problem after the fact still exposes a player to the denial, rage, and desperation stages of loss. Furthermore, in business models that function based on recurring revenue, churn should be avoided. Subscription fluctuations outside of the norm may result in lower stock valuations and strained cash flow.

There have been some well-documented advances in the account protection space over the past couple of years, and because these layers of security are customer facing I can actually observe the actions taken by different companies. Two examples worth noting are Blizzard and Steam. Blizzard has an entire section of their battle.net portal dedicated to security. They discuss best practices, provide a list of steps to take after your account gets hacked, and even offer an option to enable multifactor authentication. They also employ a specific team of resources dedicated to monitoring threats. Steam has also opted for a multifactor option in the form of its Steam Guard service. Unlike Blizzard’s system, Steam Guard uses your email instead of a second device.

There is a way to help game developers implement account security. Given the timelines and resources required to produce a game, I believe we can add tangible value to game developers by letting them focus development resources on game content instead of access and login mechanics. Our solution offloads some of the development effort by providing a battle-tested authentication engine compatible with a variety of devices and form factors.  Gemalto also substantially lowers the upfront investment and ongoing inventory costs associated with device/token management. I like to think of it as an application of the specialization of resources.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related posts:

Cloud Data Security Trends in 2016 [Infographic]

Posted on 30 August 2016 by Jennifer Hindle in Corporate

Check out our new infographic covering cloud data security trends, including adoption rates for IaaS, PaaS and SaaS, the prevalence of shadow IT, the role of data governance, and more.

Has your business unwrapped mobile security threats over the festive…

Posted on 12 January 2015 by Maria Barbieri in Corporate

With new mobile devices like the iPhone 6 and Apple iPad Air 2 topping many present lists this year, we’ve compiled top tips to help businesses ensure they haven’t unwrapped…

EMV can eliminate fraud, not just shift it

Posted on 12 July 2012 by Gemalto in Corporate

You always see us say on this blog that EMV chip technology is more secure than magnetic stripe, and prevents payment fraud and use of counterfeit cards.  Well we don’t…

From Twitter

Loading...
    More from Twitter

    Subscribe to updates

    Delivered by FeedBurner.
    Submitting this form will open a popup window to the FeedBurner website.

    Gemalto: a Thales company
    Visit Gemalto corporate site | Blogs FAQ | Privacy Policy | © 2006 - 2019 Gemalto NV
    This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

    • ACTIVITIES
    • Defence & Security
    • Digital Identity and Security
    • Aerospace
    • Space
    • Ground Transportation
    • Market-specific solutions
    • GLOBAL
    • Career
    • Investor
    • Journalist
    • Customer Online
    • SOCIAL NETWORKS
    • Facebook
    • Twitter
    • LinkedIn
    • Instagram
    • Youtube
    Decisive technology for decisive moments
    www.thalesgroup.com
    Be aware that this site uses cookies. Before continuing browsing we advise you to click on Privacy Policy to access and read our cookie policy.OkPrivacy policy