Table of Content


1 INTRODUCTION
1.1 Study Deliverables
1.2 Study Assumptions
1.3 Scope of the Study


2 RESEARCH METHODOLOGY


3 EXECUTIVE SUMMARY


4 MARKET DYNAMICS
4.1 Market Overview
4.2 Introduction to Market Drivers and Restraints
4.3 Market Drivers
4.3.1 Increasing Security Concerns
4.3.2 Increasing Number of Cyber Data Breaches
4.4 Market Restraints
4.4.1 High Costs of Security Solution
4.4.2 Complexity in Integration with Existing Network
4.5 Industry Attractiveness - Porter’s Five Force Analysis
4.5.1 Threat of New Entrants
4.5.2 Bargaining Power of Buyers/Consumers
4.5.3 Bargaining Power of Suppliers
4.5.4 Threat of Substitute Products
4.5.5 Intensity of Competitive Rivalry


5 MARKET SEGMENTATION
5.1 By Type of Solutions
5.1.1 Identity Cloud
5.1.2 Identity Governance
5.1.3 Access Management
5.1.4 Directory Services
5.1.5 Other Type of Solutions
5.2 By Type of Deployment
5.2.1 On-premise
5.2.2 Hybrid
5.2.3 Cloud-based
5.3 By Organization Size
5.3.1 Large Enterprises
5.3.2 Small & Medium Enterprises (SMEs)
5.4 By End-user Vertical
5.4.1 BFSI
5.4.2 IT & Telecom
5.4.3 Education
5.4.4 Healthcare
5.4.5 Retail
5.4.6 Energy
5.4.7 Manufacturing
5.4.8 Other End-user Vertical
5.5 Geography
5.5.1 North America
5.5.1.1 US
5.5.1.2 Canada
5.5.2 Europe
5.5.2.1 UK
5.5.2.2 Germany
5.5.2.3 France
5.5.2.4 Rest of Europe
5.5.3 Asia Pacific
5.5.3.1 China
5.5.3.2 Japan
5.5.3.3 India
5.5.3.4 Rest of Asia-Pacific
5.5.4 Latin America
5.5.4.1 Brazil
5.5.4.2 Mexico
5.5.4.3 Rest of Latin America
5.5.5 Middle East and Africa
5.5.5.1 Saudi Arabia
5.5.5.2 UAE
5.5.5.3 Rest of Middle East and Africa


6 COMPETITIVE LANDSCAPE
6.1 Company Profiles
6.1.1 IBM Corporation
6.1.2 Oracle Corporation
6.1.3 CA Technologies
6.1.4 Microsoft Corporation
6.1.5 Amazon Web Services
6.1.6 Centrify Corporation
6.1.7 Okta Inc.
6.1.8 Cyberark Software Ltd.
6.1.9 Sailpoint Technologies, Inc.
6.1.10 HID Global Corporation
6.1.11 NetIQ Corporation
6.1.12 Symantec Corporation


7 INVESTMENT ANALYSIS


8 MARKET OPPORTUNITIES AND FUTURE TRENDS