Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Industry Attractiveness - Porter’s Five Force Analysis
4.2.1 Threat of New Entrants
4.2.2 Bargaining Power of Buyers/Consumers
4.2.3 Bargaining Power of Suppliers
4.2.4 Threat of Substitute Products
4.2.5 Intensity of Competitive Rivalry
4.3 Introduction to Market Drivers and Restraints
4.4 Market Drivers
4.4.1 Data Privacy and Secured File Sharing Concerns
4.4.2 Handling of Data Generated through Connected Devices
4.5 Market Restraints
4.5.1 Use of Physical Vault
4.6 Industry Value Chain Analysis


5 MARKET SEGMENTATION
5.1 By Deployment
5.1.1 On-premise
5.1.2 Cloud
5.2 By Type
5.2.1 Solutions
5.2.2 Services
5.3 By End User
5.3.1 BFSI
5.3.2 IT & Telecommunication
5.3.3 Government
5.3.4 Other End Users
5.4 Geography
5.4.1 North America
5.4.2 Europe
5.4.3 Asia-Pacific
5.4.4 Latin America
5.4.5 Middle East & Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Johnson Controls International PLC
6.1.2 CyberArk Software Ltd.
6.1.3 Accruit, LLC
6.1.4 TokenEx
6.1.5 Oracle Corporation
6.1.6 Keeper Security
6.1.7 Multicert
6.1.8 Hitachi Limited


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS