Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Compliance Mandates from Government
4.3.2 Management of On-site Visitors and Contractors
4.4 Market Restraints
4.4.1 Security of Data Stored with Third Party (Cloud)
4.5 Industry Value Chain Analysis
4.6 Industry Attractiveness - Porter’s Five Force Analysis
4.6.1 Threat of New Entrants
4.6.2 Bargaining Power of Buyers/Consumers
4.6.3 Bargaining Power of Suppliers
4.6.4 Threat of Substitute Products
4.6.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By Type
5.1.1 Software
5.1.2 Services
5.2 By End-user Industry
5.2.1 BFSI
5.2.2 Aerospace and Defense
5.2.3 Government
5.2.4 IT and Telecom
5.2.5 Other End-user Industries
5.3 Geography
5.3.1 North America
5.3.2 Europe
5.3.3 Asia-Pacific
5.3.4 Latin America
5.3.5 Middle East & Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 HID Global Corporation
6.1.2 AlertEnterprise, Inc.
6.1.3 IDCUBE Identification Systems (P) Ltd.
6.1.4 Micro Focus International PLC
6.1.5 Amazon Web Services, Inc.
6.1.6 Convergint Technologies, LLC
6.1.7 WIPRO Ltd.
6.1.8 Acces Security Corporation
6.1.9 IBM Corporation
6.1.10 SAASPASS, Inc.


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS