Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Growth in the Number of Digital Identities
4.3.2 Authentication Needed for Security Compliances and Regulations
4.3.3 Growing Adoption of Bring Your Own Device (BYOD)
4.4 Market Restraints
4.4.1 High Cost Involved with Matured Authentication Methods
4.5 Industry Attractiveness - Porter’s Five Force Analysis
4.5.1 Threat of New Entrants
4.5.2 Bargaining Power of Buyers/Consumers
4.5.3 Bargaining Power of Suppliers
4.5.4 Threat of Substitute Products
4.5.5 Intensity of Competitive Rivalry


5 TECHNOLOGY SNAPSHOT
5.1 Token-based Authentication
5.2 Tokenless Authentication


6 MARKET SEGMENTATION
6.1 By Type
6.1.1 Single Factor Authentication
6.1.2 Multi Factor Authentication
6.2 By Deployment
6.2.1 Cloud
6.2.2 On-Premise
6.3 By End-user Industry
6.3.1 IT and Telecommunications
6.3.2 BFSI
6.3.3 Government & Defense
6.3.4 Healthcare
6.3.5 Other End-user Industry
6.4 Geography
6.4.1 North America
6.4.2 Europe
6.4.3 Asia-Pacific
6.4.4 Latin America
6.4.5 Middle East and Africa


7 COMPETITIVE LANDSCAPE
7.1 Company Profiles
7.1.1 Entrust Datacard Corporation
7.1.2 Tata Communications.
7.1.3 Verizon Communications Inc
7.1.4 Thales Group
7.1.5 CA Technology, Inc.(Broadcom Inc.)
7.1.6 Trustwave Holdings, Inc. (Singtel)
7.1.7 Amazon.com, Inc.
7.1.8 Google LLC
7.1.9 IBM Corporation
7.1.10 Microsoft Corporation


8 INVESTMENT ANALYSIS


9 MARKET OPPORTUNITIES AND FUTURE TRENDS