Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Cloud-Based Multi-Factor Authentication
4.3.2 Growing adoption of Bring Your Own Device (BYOD) Solutions
4.4 Market Restraints
4.4.1 False Security and High Cost
4.5 Value Chain Analysis
4.6 Industry Attractiveness - Porter’s Five Force Analysis
4.6.1 Threat of New Entrants
4.6.2 Bargaining Power of Buyers/Consumers
4.6.3 Bargaining Power of Suppliers
4.6.4 Threat of Substitute Products
4.6.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By Authentication Type
5.1.1 Two-Factor Authentication
5.1.2 Biometrics / Multi-Factor Authentication
5.1.3 Passwords
5.1.4 Soft Tokens
5.1.5 Other Authentication Types
5.2 By End User
5.2.1 Small Enterprises
5.2.2 Medium Enterprises
5.2.3 Large Enterprises
5.3 By Industry Vertical
5.3.1 BFSI
5.3.2 Consumer Electronics
5.3.3 Government
5.3.4 Telecommunication
5.3.5 Healthcare
5.3.6 Manufacturing
5.3.7 Other Industry Verticals
5.4 Geography
5.4.1 North America
5.4.2 Europe
5.4.3 Asia-Pacific
5.4.4 Latin America
5.4.5 Middle East & Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Broadcom Inc. (Symantec Corporation).
6.1.2 OneSpan
6.1.3 Technology Nexus AB
6.1.4 SecurEnvoy
6.1.5 Thales Group (Gemalto NV)
6.1.6 Entrust Datacard
6.1.7 Duo Security
6.1.8 Dell EMC
6.1.9 Aware, Inc.


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS