Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Increasing Number of Security Breaches and Related Costs
4.3.2 Increasing Trend of Using BYODs in Enterprises
4.4 Market Restraints
4.4.1 Vulnerability of Cloud-based Applications to Cyber Risks
4.5 Value Chain Analysis
4.6 Industry Attractiveness - Porter’s Five Forces Analysis
4.6.1 Threat of New Entrants
4.6.2 Bargaining Power of Buyers/Consumers
4.6.3 Bargaining Power of Suppliers
4.6.4 Threat of Substitute Products
4.6.5 Intensity of Competitive Rivalry


5 TECHNOLOGY SNAPSHOT


6 MARKET SEGMENTATION
6.1 By Size of Organization
6.1.1 SMEs
6.1.2 Large Organization
6.2 By Type of Solution
6.2.1 Audit, Compliance, and Governance
6.2.2 Single Sign-on (SSO) and Federated Provisioning
6.2.3 Privileged Access Management
6.2.4 Directory Service
6.2.5 Other Types of Solution
6.3 By Type of Deployment
6.3.1 Public
6.3.2 Private
6.3.3 Hybrid
6.4 By End-user Vertical
6.4.1 IT and Telecommunication
6.4.2 BFSI
6.4.3 Healthcare
6.4.4 Entertainment and Media
6.4.5 Retail
6.4.6 Education
6.4.7 Other End-user Verticals
6.5 Geography
6.5.1 North America
6.5.2 Europe
6.5.3 Asia-Pacific
6.5.4 Latin America
6.5.5 Middle East & Africa


7 COMPETITIVE LANDSCAPE
7.1 Company Profiles
7.1.1 Cyberark Software Ltd
7.1.2 Broadcom Inc. (CA Technologies)
7.1.3 IBM Corporation
7.1.4 Microsoft Corporation
7.1.5 Oracle Corporation
7.1.6 Okta Inc.
7.1.7 Centrify Corporation
7.1.8 Sailpoint Technologies Holdings Inc.
7.1.9 Auth0 Inc.
7.1.10 Dell Technologies Inc.


8 INVESTMENT ANALYSIS


9 MARKET OPPORTUNITIES AND FUTURE TRENDS