Table of Content


1 Preface

2 Scope and Methodology
2.1 Objectives of the Study
2.2 Stakeholders
2.3 Data Sources
2.3.1 Primary Sources
2.3.2 Secondary Sources
2.4 Market Estimation
2.4.1 Bottom-Up Approach
2.4.2 Top-Down Approach
2.5 Forecasting Methodology

3 Executive Summary

4 Introduction
4.1 Overview
4.2 Key Industry Trends

5 Global Multi-Factor Authentication Market
5.1 Market Overview
5.2 Market Performance
5.3 Impact of COVID-19
5.4 Market Forecast

6 Market Breakup by Model
6.1 Two-Factor Authentication
6.1.1 Market Trends
6.1.2 Market Forecast
6.2 Three-Factor Authentication
6.2.1 Market Trends
6.2.2 Market Forecast
6.3 Four-Factor Authentication
6.3.1 Market Trends
6.3.2 Market Forecast
6.4 Five-Factor Authentication
6.4.1 Market Trends
6.4.2 Market Forecast

7 Market Breakup by Deployment Type
7.1 On-Premises
7.1.1 Market Trends
7.1.2 Market Forecast
7.2 On-Cloud
7.2.1 Market Trends
7.2.2 Market Forecast

8 Market Breakup by Application
8.1 Smart Card Authentication
8.1.1 Market Trends
8.1.2 Market Forecast
8.2 Phone-Based Authentication
8.2.1 Market Trends
8.2.2 Market Forecast
8.3 Hardware OTP Token Authentication
8.3.1 Market Trends
8.3.2 Market Forecast

9 Market Breakup by Vertical
9.1 Banking & Finance
9.1.1 Market Trends
9.1.2 Market Forecast
9.2 Government
9.2.1 Market Trends
9.2.2 Market Forecast
9.3 Travel & Immigration
9.3.1 Market Trends
9.3.2 Market Forecast
9.4 Military & Defence
9.4.1 Market Trends
9.4.2 Market Forecast
9.5 IT and Telecom
9.5.1 Market Trends
9.5.2 Market Forecast
9.6 Healthcare
9.6.1 Market Trends
9.6.2 Market Forecast
9.7 Retail and Ecommerce
9.7.1 Market Trends
9.7.2 Market Forecast
9.8 Others
9.8.1 Market Trends
9.8.2 Market Forecast

10 Market Breakup by Region
10.1 North America
10.1.1 United States
10.1.1.1 Market Trends
10.1.1.2 Market Forecast
10.1.2 Canada
10.1.2.1 Market Trends
10.1.2.2 Market Forecast
10.2 Europe
10.2.1 Germany
10.2.1.1 Market Trends
10.2.1.2 Market Forecast
10.2.2 France
10.2.2.1 Market Trends
10.2.2.2 Market Forecast
10.2.3 United Kingdom
10.2.3.1 Market Trends
10.2.3.2 Market Forecast
10.2.4 Italy
10.2.4.1 Market Trends
10.2.4.2 Market Forecast
10.2.5 Spain
10.2.5.1 Market Trends
10.2.5.2 Market Forecast
10.2.6 Russia
10.2.6.1 Market Trends
10.2.6.2 Market Forecast
10.2.7 Others
10.2.7.1 Market Trends
10.2.7.2 Market Forecast
10.3 Asia Pacific
10.3.1 China
10.3.1.1 Market Trends
10.3.1.2 Market Forecast
10.3.2 Japan
10.3.2.1 Market Trends
10.3.2.2 Market Forecast
10.3.3 India
10.3.3.1 Market Trends
10.3.3.2 Market Forecast
10.3.4 South Korea
10.3.4.1 Market Trends
10.3.4.2 Market Forecast
10.3.5 Australia
10.3.5.1 Market Trends
10.3.5.2 Market Forecast
10.3.6 Indonesia
10.3.6.1 Market Trends
10.3.6.2 Market Forecast
10.3.7 Others
10.3.7.1 Market Trends
10.3.7.2 Market Forecast
10.4 Latin America
10.4.1 Brazil
10.4.1.1 Market Trends
10.4.1.2 Market Forecast
10.4.2 Mexico
10.4.2.1 Market Trends
10.4.2.2 Market Forecast
10.4.3 Argentina
10.4.3.1 Market Trends
10.4.3.2 Market Forecast
10.4.4 Colombia
10.4.4.1 Market Trends
10.4.4.2 Market Forecast
10.4.5 Chile
10.4.5.1 Market Trends
10.4.5.2 Market Forecast
10.4.6 Peru
10.4.6.1 Market Trends
10.4.6.2 Market Forecast
10.4.7 Others
10.4.7.1 Market Trends
10.4.7.2 Market Forecast
10.5 Middle East and Africa
10.5.1 Turkey
10.5.1.1 Market Trends
10.5.1.2 Market Forecast
10.5.2 Saudi Arabia
10.5.2.1 Market Trends
10.5.2.2 Market Forecast
10.5.3 Iran
10.5.3.1 Market Trends
10.5.3.2 Market Forecast
10.5.4 United Arab Emirates
10.5.4.1 Market Trends
10.5.4.2 Market Forecast
10.5.5 Others
10.5.5.1 Market Trends
10.5.5.2 Market Forecast

11 SWOT Analysis
11.1 Overview
11.2 Strengths
11.3 Weaknesses
11.4 Opportunities
11.5 Threats

12 Value Chain Analysis

13 Porters Five Forces Analysis
13.1 Overview
13.2 Bargaining Power of Buyers
13.3 Bargaining Power of Suppliers
13.4 Degree of Competition
13.5 Threat of New Entrants
13.6 Threat of Substitutes

14 Competitive Landscape
14.1 Market Structure
14.2 Key Players
14.3 Profiles of Key Players
14.3.1 CA Technologies
14.3.1.1 Company Overview
14.3.1.2 Product Portfolio
14.3.2 Crossmatch
14.3.2.1 Company Overview
14.3.2.2 Product Portfolio
14.3.2.3 Financials
14.3.2.4 SWOT Analysis
14.3.3 Deepnet Security Ltd.
14.3.3.1 Company Overview
14.3.3.2 Product Portfolio
14.3.4 Entrust
14.3.4.1 Company Overview
14.3.4.2 Product Portfolio
14.3.5 Fujitsu
14.3.5.1 Company Overview
14.3.5.2 Product Portfolio
14.3.5.3 Financials
14.3.5.4 SWOT Analysis
14.3.6 Gemalto NV
14.3.6.1 Company Overview
14.3.6.2 Product Portfolio
14.3.7 Microsoft Corporation
14.3.7.1 Company Overview
14.3.7.2 Product Portfolio
14.3.7.3 Financials
14.3.7.4 SWOT Analysis
14.3.8 NEC Corp.
14.3.8.1 Company Overview
14.3.8.2 Product Portfolio
14.3.8.3 Financials
14.3.8.4 SWOT Analysis
14.3.9 Okta
14.3.9.1 Company Overview
14.3.9.2 Product Portfolio
14.3.9.3 Financials
14.3.10 Ping Identity
14.3.10.1 Company Overview
14.3.10.2 Product Portfolio
14.3.11 RSA Security
14.3.11.1 Company Overview
14.3.11.2 Product Portfolio
14.3.12 SecureAuth
14.3.12.1 Company Overview
14.3.12.2 Product Portfolio
14.3.13 SecurEnvoy
14.3.13.1 Company Overview
14.3.13.2 Product Portfolio
14.3.14 Suprema HQ
14.3.14.1 Company Overview
14.3.14.2 Product Portfolio
14.3.14.3 Financials
14.3.15 Symantec VIP
14.3.15.1 Company Overview
14.3.15.2 Product Portfolio
14.3.15.3 Financials