[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Mobile User Authentication Market by User Type (Small and Medium Enterprises (SME’s) and Enterprises), Vertical, and Region (North America, Europe, Asia-Pacific, Middle East and Africa, and Latin America) - Global Forecast and Analysis to 2020

October 2015 | 114 pages | ID: M60AA2ADEE3EN
MarketsandMarkets

US$ 5,650.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
Today, most of enterprises are vying to effectively address the security and the authentication concerns attributed to verify the end-users and legitimize his/her actions. The end-users are becoming highly aware of the security aspect and most of the software providers are incorporating security into their service level agreements. But major boost to the need of strong authentication is attributed to increase in insider data thefts and whistle-blowing as well increased frequency of cyber-attacks on enterprises. It has been observed that most of the attacks on large enterprises have been state-sponsored and are committed to derail the business processes of the enterprises to ultimately cause monetary damage.

Most of enterprises consist of voluminous amount of sensitive organizational data which is being generated on a daily basis. This data may vary from spreadsheets to huge databases and can be highly unstructured. There need to be pre-defined security and access policies to this data to ensure that who access what type of data. At the same time, there an urgent need in managing, protecting and revoking credentials of a private individual. Also, the growth of mobile user authentication is due to the increased need in verifying and validating the end-user based on its behavioral characteristics. The behavioral characteristics such as time of login, pattern of login, geographical co-ordinates and timestamps are being used more frequently to deliver robust authentication solutions. The mobile user authentication market can be defined as the market for the authenticating an end-user using factored authentication in which one of the authentication factor is mobile which is in the possession of the end-user. Mobile user authentication not only provides secured access to the sensitive content but it is also instrumental in framing and enforcing different security and access control policies in any organization. Mobile user authentication is crucial in providing a unified view about enterprise wide-security and introduces greater visibility and transparency in business processes of an organization.

The mobile user authentication market has been segmented on the basis of user types into Small and Medium Enterprises (SMEs) and enterprises; on the basis of verticals types into academia & education, Banking, Financial Services, and Insurance (BFSI), consumer goods & retail, energy & power, government & defense, life sciences & healthcare, manufacturing, IT & telecom, and others; and on the basis of regions into North America, Asia-Pacific (APAC), Europe, the Middle East and Africa (MEA), and Latin America. The report also provides insights into the opportunity analysis of specific verticals and business case analysis and roadmaps for the mobile user authentication market.

There are various assumptions that have been taken into consideration for the market sizing and forecasting exercise. Few global assumptions include political, economic, social, technological, and economic factors. For instance, exchange rates, one of the economic factors, are expected to have a moderate rating of impact on this market. Therefore, dollar fluctuations are expected to not seriously affect the forecasts in the emerging regions.

The report will help the market leaders/new entrants in this market in the following ways:

1. This report segments the market into user types, verticals, and regions covering this market comprehensively. The report provides the closest approximations of the revenue numbers for the overall market. The market numbers are further split across the different verticals and regions.
2. This report will help them better understand the competitors and gain more insights to better position their business. There is a separate section on competitive landscape, including competitor ecosystem, mergers and acquisition, and partnerships and agreements. Besides, there are company profiles of top 10 players in this market along with two key innovators.
3. The report helps them understand the pulse of the market. The report provides information on key market drivers, restraints, challenges, and opportunities.

1 INTRODUCTION

1.1 OBJECTIVES OF THE STUDY
1.2 MARKET DEFINITION
1.3 MARKET SCOPE
  1.3.1 MARKETS COVERED
  1.3.2 YEARS CONSIDERED FOR THE STUDY
1.4 LIMITATIONS
1.5 CURRENCY
1.6 STAKEHOLDERS

2 RESEARCH METHODOLOGY

2.1 RESEARCH DATA
  2.1.1 SECONDARY DATA
    2.1.1.1 Key data from secondary sources
  2.1.2 PRIMARY DATA
    2.1.2.1 Key data from primary sources
    2.1.2.2 Key industry insights
    2.1.2.3 Breakdown of primary interviews: by company type, designation, and region
2.2 MARKET SIZE ESTIMATION
  2.2.1 BOTTOM-UP APPROACH
  2.2.2 TOP-DOWN APPROACH
2.3 MARKET BREAKDOWN AND DATA TRIANGULATION
2.4 RESEARCH ASSUMPTIONS

3 EXECUTIVE SUMMARY

4 PREMIUM INSIGHTS

4.1 ATTRACTIVE MARKET OPPORTUNITIES IN THE MOBILE USER AUTHENTICATION MARKET
4.2 MOBILE USER AUTHENTICATION MARKET
4.3 MOBILE USER AUTHENTICATION MARKET POTENTIAL
4.4 MOBILE USER AUTHENTICATION REGIONAL MARKET
4.5 MOBILE USER AUTHENTICATION MARKET: VERTICAL GROWTH MATRIX
4.6 LIFECYCLE ANALYSIS, BY REGION, 2015

5 MARKET OVERVIEW

5.1 INTRODUCTION
  5.1.1 BY USER TYPE
  5.1.2 BY VERTICAL
  5.1.3 BY REGION
5.2 MARKET DYNAMICS
  5.2.1 DRIVERS
    5.2.1.1 Growth of online data sharing and BYOD
    5.2.1.2 Growth in high profile cyber attacks
    5.2.1.3 Increase in regulatory compliances
    5.2.1.4 Increased traction for vulnerability assessment and management
  5.2.2 RESTRAINTS
    5.2.2.1 Existing base of authentication solutions
    5.2.2.2 Shadow IT risk
  5.2.3 OPPORTUNITIES
    5.2.3.1 Growing impetus to Internet of Things (IoT)
    5.2.3.2 Demand for Authentication-as-a-Service (AaaS)
  5.2.4 CHALLENGES
    5.2.4.1 Educating consumers about security and authentication
    5.2.4.2 Security issues associated with cloud and mobile technologies

6 INDUSTRY TRENDS

6.1 INTRODUCTION
6.2 MOBILE USER AUTHENTICATION MARKET: VALUE CHAIN ANALYSIS
6.3 PORTER’S FIVE FORCES ANALYSIS
  6.3.1 THREAT OF NEW ENTRANTS
  6.3.2 THREAT OF SUBSTITUTES
  6.3.3 BARGAINING POWER OF SUPPLIERS
  6.3.4 BARGAINING POWER OF BUYERS
  6.3.5 INTENSITY OF COMPETITIVE RIVALRY

7 MOBILE USER AUTHENTICATION MARKET ANALYSIS

7.1 INTRODUCTION

8 MOBILE USER AUTHENTICATION MARKET ANALYSIS, BY USER TYPE

8.1 INTRODUCTION
8.2 SMES
8.3 ENTERPRISES

9 MOBILE USER AUTHENTICATION MARKET ANALYSIS, BY VERTICAL

9.1 INTRODUCTION
9.2 ACADEMIA AND EDUCATION
9.3 BANKING, FINANCIAL SERVICES AND INSURANCE (BFSI)
9.4 CONSUMER GOODS AND RETAIL
9.5 ENERGY AND POWER
9.6 GOVERNMENT AND DEFENSE
9.7 LIFE SCIENCES AND HEALTHCARE
9.8 IT AND TELECOM
9.9 MANUFACTURING
9.10 OTHERS

10 GEOGRAPHIC ANALYSIS

10.1 INTRODUCTION
10.2 NORTH AMERICA
10.3 EUROPE
10.4 ASIA-PACIFIC
10.5 MIDDLE EAST AND AFRICA
10.6 LATIN AMERICA

11 COMPETITIVE LANDSCAPE

11.1 OVERVIEW
11.2 COMPETITIVE SITUATION AND TRENDS
  11.2.1 NEW PRODUCT DEVELOPMENTS
  11.2.2 PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS
  11.2.3 MERGERS AND ACQUISITIONS
  11.2.4 NEW CONTRACTS
  11.2.5 DELIVERY MODELS

12 COMPANY PROFILES

12.1 INTRODUCTION

(Overview, Financials, Products & Services, Strategy, and Developments)*

12.2 CA TECHNOLOGIES INC.
12.3 EMC CORPORATION
12.4 GEMALTO NV
12.5 SYMANTEC CORPORATION
12.6 VASCO DATA SECURITY INTERNATIONAL INC.
12.7 AUTHENTIFY INC.
12.8 ENTRUST DATACARD CORPORATION
12.9 SECUREAUTH CORPORATION
12.10 SECURENVOY PLC
12.11 TELESIGN

*Details on overview, financials, product & services, strategy, and developments might not be captured in case of unlisted companies.

13 KEY INNOVATOR PROFILES

13.1 DEEPNET SECURITY
  13.1.1 BUSINESS OVERVIEW
  13.1.2 SOLUTIONS OFFERED
13.2 SMS PASSCODE A/S
  13.2.1 BUSINESS OVERVIEW
  13.2.2 SOLUTIONS OFFERED

14 APPENDIX

14.1 INDUSTRY EXCERPTS
  14.1.1 NEW PRODUCT DEVELOPMENTS, 2013–2015
  14.1.2 PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS
  14.1.3 NEW CONTRACTS
14.2 DISCUSSION GUIDE
14.3 INTRODUCING RT: REAL-TIME MARKET INTELLIGENCE
14.4 AVAILABLE CUSTOMIZATIONS
14.5 RELATED REPORTS

LIST OF TABLES

Table 1 MOBILE USER AUTHENTICATION MARKET SIZE AND GROWTH RATE, 2013–2020 (USD MILLION, Y-O-Y %)
Table 2 MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF DRIVERS
Table 3 MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF RESTRAINTS
Table 4 MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF OPPORTUNITIES
Table 5 MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF CHALLENGES
Table 6 MOBILE USER AUTHENTICATION MARKET SIZE, 2013–2020 (USD MILLION)
Table 7 MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 8 SMES: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION)
Table 9 ENTERPRISES: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION)
Table 10 MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013–2020 (USD MILLION)
Table 11 ACADEMIA AND EDUCATION: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION)
Table 12 ACADEMIA AND EDUCATION: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 13 BFSI: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION)
Table 14 BFSI: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 15 CONSUMER GOODS AND RETAIL: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION)
Table 16 CONSUMER GOODS AND RETAIL: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 17 ENERGY AND POWER: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION)
Table 18 ENERGY AND POWER: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 19 GOVERNMENT AND DEFENSE: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION)
Table 20 GOVERNMENT AND DEFENSE: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 21 LIFE SCIENCES AND HEALTHCARE: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION)
Table 22 LIFE SCIENCES AND HEALTHCARE: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 23 IT AND TELECOM: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION)
Table 24 IT AND TELECOM: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 25 MANUFACTURING: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION)
Table 26 MANUFACTURING: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 27 OTHERS: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION)
Table 28 OTHERS: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 29 MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013–2020 (USD MILLION)
Table 30 NORTH AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013–2020 (USD MILLION)
Table 31 NORTH AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 32 EUROPE: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013–2020 (USD MILLION)
Table 33 EUROPE: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 34 ASIA-PACIFIC: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013–2020 (USD MILLION)
Table 35 ASIA-PACIFIC: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 36 MIDDLE EAST AND AFRICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013–2020 (USD MILLION)
Table 37 MIDDLE EAST AND AFRICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 38 LATIN AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013–2020 (USD MILLION)
Table 39 LATIN AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013–2020 (USD MILLION)
Table 40 NEW PRODUCT DEVELOPMENTS, 2013–2015
Table 41 PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS, 2013–2015
Table 42 MERGERS AND ACQUISITIONS, 2013–2015
Table 43 NEW CONTRACTS, 2013–2015
Table 44 PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS, 2013–2015
Table 45 NEW CONTRACTS, 2013–2015

LIST OF FIGURES

Figure 1 RESEARCH DESIGN
Figure 2 MARKET SIZE ESTIMATION METHODOLOGY: BOTTOM-UP APPROACH
Figure 3 MARKET SIZE ESTIMATION METHODOLOGY: TOP-DOWN APPROACH
Figure 4 DATA TRIANGULATION
Figure 5 MOBILE USER AUTHENTICATION MARKET SIZE, USER TYPE SNAPSHOT (2015–2020): SME MARKET IS EXPECTED TO QUADRUPLE BY 2020
Figure 6 MOBILE USER AUTHENTICATION MARKET SHARE: NORTH AMERICA IS EXPECTED TO HOLD THE LARGEST MARKET SHARE IN 2015
Figure 7 GROWTH IN ONLINE DATA SHARING AND INCREASED ADOPTION OF BYOD IS DRIVING THE MOBILE USER AUTHENTICATION MARKET
Figure 8 NORTH AMERICA IS EXPECTED TO EXHIBIT THE HIGHEST MARKET SHARE IN THE MOBILE USER AUTHENTICATION MARKET (2015)
Figure 9 ASIA-PACIFIC AND MIDDLE EAST & AFRICA ARE EXPECTED TO HAVE THE HIGHEST MARKET GROWTH POTENTIAL DURING THE FORECAST PERIOD
Figure 10 ASIA-PACIFIC IS EXPECTED TO GROW WITH HIGHER CAGR THAN MIDDLE EAST & AFRICA AND LATIN AMERICA
Figure 11 MOBILE USER AUTHENTICATION VERTICAL GROWTH MATRIX
Figure 12 REGIONAL LIFECYCLE: ASIA-PACIFIC IS IN THE GROWTH PHASE IN 2015
Figure 13 MOBILE USER AUTHENTICATION MARKET SEGMENTATION: BY USER TYPE
Figure 14 MOBILE USER AUTHENTICATION MARKET SEGMENTATION: BY VERTICAL
Figure 15 MOBILE USER AUTHENTICATION MARKET SEGMENTATION: BY REGION
Figure 16 MOBILE USER AUTHENTICATION: DRIVERS, RESTRAINTS, OPPORTUNITIES, AND CHALLENGES
Figure 17 VALUE CHAIN ANALYSIS
Figure 18 PORTER’S FIVE FORCES ANALYSIS: MOBILE USER AUTHENTICATION MARKET
Figure 19 SMES WILL EXHIBIT HIGHER GROWTH RATE IN THE MOBILE USER AUTHENTICATION MARKET DURING THE FORECAST PERIOD
Figure 20 GOVERNMENT AND DEFENSE VERTICAL IS EXPECTED TO HAVE THE LARGEST MARKET SIZE IN THE MOBILE USER AUTHENTICATION MARKET BY 2020
Figure 21 NORTH AMERICA WILL CONTINUE TO HAVE THE LARGEST MARKET SIZE IN THE MOBILE USER AUTHENTICATION MARKET DURING THE FORECAST PERIOD 2015–2020
Figure 22 GEOGRAPHIC SNAPSHOT: ASIA-PACIFIC IS EMERGING AS A NEW HOTSPOT IN THE MOBILE USER AUTHENTICATION MARKET
Figure 23 ASIA-PACIFIC IS THE FASTEST GROWING MARKET IN THE MOBILE USER AUTHENTICATION MARKET
Figure 24 NORTH AMERICA MARKET SNAPSHOT: INCREASED TRACTION AMONG VERTICALS WILL DRIVE THE MARKET
Figure 25 ASIA-PACIFIC MARKET SNAPSHOT: INCREASED TRACTION AMONG GROWING ECONOMIES WILL DRIVE THE MARKET
Figure 26 COMPANIES ADOPTED, ACQUISITIONS, NEW PRODUCT DEVELOPMENTS, AND PARTNERSHIP AGREEMENTS AND COLLABORATIONS AS THE KEY GROWTH STRATEGIES FOR THE -PERIOD 2013-2015
Figure 27 MARKET EVALUATION FRAMEWORK
Figure 28 BATTLE FOR MARKET SHARE: NEW PRODUCT LAUNCHES WAS THE KEY STRATEGY ADOPTED BY PLAYERS DURING THE LAST 3 YEARS
Figure 29 GEOGRAPHIC REVENUE MIX OF TOP FIVE PLAYERS
Figure 30 CA TECHNOLOGIES INC.: COMPANY SNAPSHOT
Figure 31 CA TECHNOLOGIES INC.: SWOT ANALYSIS
Figure 32 EMC CORPORATION: COMPANY SNAPSHOT
Figure 33 EMC CORPORATION: SWOT ANALYSIS
Figure 34 GEMALTO NV: COMPANY SNAPSHOT
Figure 35 GEMALTO NV: SWOT ANALYSIS
Figure 36 SYMANTEC CORPORATION: COMPANY SNAPSHOT
Figure 37 SYMANTEC CORPORATION: SWOT ANALYSIS
Figure 38 VASCO DATA SECURITY INTERNATIONAL INC.: COMPANY SNAPSHOT
Figure 39 VASCO DATA SECURITY INTERNATIONAL, INC: SWOT ANALYSIS


More Publications