Table of Content


1 INTRODUCTION
1.1 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET INSIGHTS
4.1 Market Overview
4.2 Industry Attractiveness – Porter’s Five Force Analysis
4.2.1 Bargaining Power of Suppliers
4.2.2 Bargaining Power of Consumers
4.2.3 Threat of New Entrants
4.2.4 Threat of Substitute Products
4.2.5 Competitive Rivalry within the Industry


5 MARKET DYNAMICS
5.1 Introduction to Market Drivers and Restraints
5.2 Market Drivers
5.2.1 Increasing Number of Cyber Attacks and Data Breaches
5.2.2 Growing Trend of Bring your Own Device (BYOD)
5.3 Market Restraints
5.3.1 Lack of Knowledge About Risk-Based Authentication


6 TECHNOLOGY SNAPSHOT


7 MARKET SEGMENTATION
7.1 By Offering
7.1.1 Solution
7.1.2 Service
7.2 By Deployment
7.2.1 On-Premise
7.2.2 Cloud
7.3 By End-user Vertical
7.3.1 Banking and Financial Services (BFSI)
7.3.2 Retail
7.3.3 IT and Telecommunication
7.3.4 Government
7.3.5 Healthcare
7.3.6 Other End-user Verticals
7.4 Geography
7.4.1 North America
7.4.2 Europe
7.4.3 Asia-Pacific
7.4.4 Latin America
7.4.5 Middle East & Africa


8 COMPETITIVE LANDSCAPE
8.1 Company Profiles
8.1.1 RSA Security LLC
8.1.2 IBM Corporation
8.1.3 Broadcom Inc. (CA Technologies Inc.)
8.1.4 Micro Focus International plc
8.1.5 Okta Inc.
8.1.6 SecureAuth Corporation
8.1.7 Thales Group (Gemalto N.V.)
8.1.8 Equifax Inc.
8.1.9 Oracle Corporation
8.1.10 Cross Match Technologies, Inc.
8.1.11 Financial Software Systems, Inc.


9 INVESTMENT ANALYSIS


10 MARKET OPPORTUNITIES AND FUTURE TRENDS