Table of Content


1 INTRODUCTION
1.1 Study Assumptions
1.2 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Market Drivers
4.2.1 Increased Number of Cloud Users and Datacenters
4.2.2 Increasing Number of Security Breaches and Related Costs
4.3 Market Restraints
4.3.1 Privacy Concerns towards the Authentication Vendor and High Costs of Token
4.4 Industry Value Chain Analysis
4.5 Industry Attractiveness - Porter’s Five Force Analysis
4.5.1 Threat of New Entrants
4.5.2 Bargaining Power of Buyers/Consumers
4.5.3 Bargaining Power of Suppliers
4.5.4 Threat of Substitute Products
4.5.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By Authentication Methods
5.1.1 Smartcards
5.1.2 Biometrics
5.1.3 Tokens
5.1.4 User-based Public Key Infrastructure
5.1.5 Other Authentication Methods
5.2 By Deployment Model
5.2.1 On-premise
5.2.2 Cloud
5.3 Geography
5.3.1 North America
5.3.2 Europe
5.3.3 Asia Pacific
5.3.4 Rest of the World


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 Fujitsu Ltd.
6.1.2 Gemalto NV (Thales group)
6.1.3 NEC Corporation
6.1.4 Broadcom Inc.
6.1.5 Safran Identity and Security SAS.
6.1.6 Dell Technologies Inc. (RSA Security)
6.1.7 Lumidigm Inc (HID Global)
6.1.8 Validsoft
6.1.9 Pistolstar Inc.
6.1.10 WideBand Corporation
6.1.11 SecureAuth Corporation


7 MARKET OPPORTUNITIES AND FUTURE TRENDS


8 INVESTMENT ANALYSIS