Skip to content
Thales
Digital Identity & Security Blog
  • Enterprise Security
  • Financial Services
  • Identity & Biometric Solutions
  • Secure IoT Solutions
  • Mobile
  • Software Monetization
    • Thales (865)
    • Marta Bordonada (52)
    • Xavier Larduinat (49)
    • Jennifer Dean (46)
    • Tim Cawsey (43)
    • Didier Benkoël (40)
    • Dominique Brulé (31)
    • Rémi de Fouchier (31)
    • Philippe Vallée (30)
    • Sebastien Violette (27)
    • Kristel Teyras (26)
    • Frederic Martinez (25)
    • Philippe Benitez (23)
    • Sophie Bessin-Py (21)
    • Haider Iqbal (18)
    • Isabelle Lodo (17)
    • Neville Pattinson (17)
    • Christian Hartwigsson (14)
    • Florent Abat (13)
    • Nicole Williams (13)
    • Sek Leong (12)
    • Yecaneh Aguado (11)
    • Jennifer Taubert (10)
    • Ken Abbott (9)
    • Cecile Eurendjian (9)
    • Alex Hanway (8)
    • Kim Depussé (8)
    • Neil Bosworth (8)
    • Stéphane Quetglas (8)
    • Emmanuel Legros (6)
    • More bloggers... ▶

Posted on 07 September 2011 by Thales

Securing Gamer Accounts and Online Assets

Enterprise Security

Last updated: 21 March 2014

My final installment in this series features the security of a player’s online persona or assets. If you’ve ever played a game that involves accomplishments or accumulating items, you know how much you care about this layer of security.  No one wants to wake up one morning, log in to World of Warcraft and find all of his precious epics disenchanted. Some games have better customer service than others, but correcting the problem after the fact still exposes a player to the denial, rage, and desperation stages of loss. Furthermore, in business models that function based on recurring revenue, churn should be avoided. Subscription fluctuations outside of the norm may result in lower stock valuations and strained cash flow.

There have been some well-documented advances in the account protection space over the past couple of years, and because these layers of security are customer facing I can actually observe the actions taken by different companies. Two examples worth noting are Blizzard and Steam. Blizzard has an entire section of their battle.net portal dedicated to security. They discuss best practices, provide a list of steps to take after your account gets hacked, and even offer an option to enable multifactor authentication. They also employ a specific team of resources dedicated to monitoring threats. Steam has also opted for a multifactor option in the form of its Steam Guard service. Unlike Blizzard’s system, Steam Guard uses your email instead of a second device.

There is a way to help game developers implement account security. Given the timelines and resources required to produce a game, I believe we can add tangible value to game developers by letting them focus development resources on game content instead of access and login mechanics. Our solution offloads some of the development effort by providing a battle-tested authentication engine compatible with a variety of devices and form factors.  Gemalto also substantially lowers the upfront investment and ongoing inventory costs associated with device/token management. I like to think of it as an application of the specialization of resources.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related stories

The Growing Challenge of Online Fraud…

Enterprise Security / Financial Services

How Can Banks Combat Online Payment…

Enterprise Security / Financial Services

How to Safeguard Mobile Connectivity in…

Enterprise Security
Thales
  • Defence & Security
  • Digital Identity & Security
  • Aerospace
  • Space
  • Ground Transportation
  • Market-specific Solutions
  • Career
  • Investor
  • Journalist
  • Customer Online
  • Enterprise Security
  • Financial Services
  • Identity & Biometric Solutions
  • Secure IoT Solutions
  • Mobile
  • Software Monetization
  • 2020 Thales Group
  • Credits
  • Legal notice
  • Data privacy
  • FAQs
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.
Facebook LinkedIn Twitter