Cover Image
市場調查報告書

特權ID管理的全球市場:2016∼2020年

Global Privileged Identity Management Market 2016-2020

出版商 TechNavio (Infiniti Research Ltd.) 商品編碼 217607
出版日期 內容資訊 英文 59 Pages
訂單完成後即時交付
價格
Back to Top
特權ID管理的全球市場:2016∼2020年 Global Privileged Identity Management Market 2016-2020
出版日期: 2016年07月22日 內容資訊: 英文 59 Pages
簡介

特權ID管理(PIM)解決方案,是IT管理者和應用存取知識產權和企業的財務、員工資訊等的機密資訊時,為了保護、追蹤、監視特權證明的東西。資訊長和最高資訊安全負責人,安全管理者為了能認識導入這個技術的必要性,及用戶和設備的保護層級,PIM是對企業的安全來說優先順序最高的事項。

本報告提供特權ID管理的全球市場的目前方案和成長的展望,以專家意見為基礎的市場分析,主要供應商分析等。

第1章 摘要整理

第2章 調查的對象

  • 市場概要

第3章 市場調查手法

  • 調查手法
  • 經濟指標

第4章 簡介

  • 主要市場焦點

第5章 市場展望

  • 市場概要
  • PIM的分數領先

第6章 PIM的主要用戶類型

  • 特權ID的種類
  • 引進模式

第7章 市場規模與預測

  • PIM的全球市場

第8章 各終端用戶市場分類

  • 大企業的PIM市場
  • 政府部門的PIM市場
  • 中小企業的PIM市場

第9章 各產品市場分類

  • 各產品的PIM的全球市場

第10章 地區的分類

  • PIM市場地區的分類
  • 亞太地區
  • 歐洲、中東、非洲
  • 南北美洲

第11章 市場促進要素

  • 法規遵守主張
  • 局內人的威脅高漲
  • 重要資料的洩漏
  • 更高的員工生產率的需求

第12章 促進要素與其影響

第13章 市場課題

  • PIM實行的課題
  • 網路基礎設施的複雜性
  • 發展途中地區中的低引進率

第14章 促進要素的影響與課題

第15章 市場趨勢

  • SSH密鑰的PIM解決方案的登場
  • PIM套裝的新附加功能
  • SaaS型PIM解決方案的人氣上升
  • BYOD政策引進的增加
  • 整合其他安全零組件的焦點

第16章 趨勢的影響

第17章 購買標準

  • PIM解決方案的購買標準

第18章 波特的五力分析

第19章 供應商的展望

  • 競爭的展望
  • BeyondTrust
  • CA Technologies
  • Centrify Corporation
  • CyberArk
  • IBM
  • ARCON
  • 其他關注的供應商

第20章 主要供應商分析

  • BeyondTrust
  • CA Technologies
  • Centrify Corporation
  • CyberArk
  • IBM
  • Assumptions

第21章 附屬資料

第22章 關於Technavio

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄
Product Code: IRTNTR10080

About Privileged Identity Management

PIM solutions protect, track, and audit privileged credentials used by IT administrators and applications when accessing sensitive information, including IP rights, company financials, and employee details. PIM is the highest priority for enterprise security because chief information officers, chief information security officers, and security managers are able to recognize the need to deploy the technology and the levels of user and device protection.

Technavio's analysts forecast the global privileged identity management (PIM) market to grow at a CAGR of 19.71% during the period 2016-2020.

Covered in this report

The report covers the present scenario and the growth prospects of the global privileged identity management (PIM) market for 2016-2020. To calculate the market size, the report considers the revenue generated from perpetual licensing and services.

The market is divided into the following segments based on geography:

  • Americas
  • APAC
  • EMEA

Technavio's report, Global Privileged Identity Management (PIM) Market 2016-2020, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects over the coming years. The report also includes a discussion of the key vendors operating in this market.

Key vendors

  • BeyondTrust
  • CA Technologies
  • CyberArk
  • Centrify Corporation
  • ARCON
  • IBM

Other Prominent Vendors

  • BalaBit
  • Dell
  • Hitachi ID Systems
  • MasterSAM
  • NetIQ
  • NRI SecureTechnologies
  • ObserveIT
  • Thycotic
  • Wallix
  • Xceedium

Market driver

  • Need for enhanced employee productivity
  • For a full, detailed list, view our report

Market challenge

  • Complexity of network infrastructure
  • For a full, detailed list, view our report

Market trend

  • Growing popularity of SaaS-based PIM solutions
  • For a full, detailed list, view our report

Key questions answered in this report

  • What will the market size be in 2020 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

You can request one free hour of our analyst's time when you purchase this market report. Details are provided within the report.

Table of Contents

PART 01: Executive summary

  • Key findings

PART 02: Scope of the report

  • Market overview

PART 03: Market research methodology

  • Research methodology
  • Economic indicators

PART 04: Introduction

  • Key market highlights

PART 05: Market landscape

  • Market overview
  • Advantages of PIM

PART 06: Primary user types of PIM

  • Types of privileged identity
  • Deployment model

PART 07: Market size and forecast

  • Global PIM market

PART 08: Market segmentation by end-users

  • PIM market for large enterprises
  • PIM market in government sector
  • PIM market for SMEs

PART 09: Market segmentation by product

  • Global PIM market by product

PART 10: Geographical segmentation

  • Geographical segmentation of PIM market
  • PIM market in APAC
  • PIM market in EMEA
  • PIM market in Americas

PART 11: Market drivers

  • Regulatory compliance initiatives
  • Growing insider threats
  • High-profile data breaches
  • Need for enhanced employee productivity

PART 12: Impact of drivers

PART 13: Market challenges

  • PIM implementation challenges
  • Complexity of network infrastructure
  • Low adoption in developing regions

PART 14: Impact of drivers and challenges

PART 15: Market trends

  • Emergence of PIM solution for SSH keys
  • Addition of new features to PIM suite
  • Growing popularity of SaaS-based PIM solutions
  • Increasing adoption of BYOD policies
  • Focus on integration with other security components

PART 16: Impact of trends

PART 17: Buying criteria

  • Buying criteria for PIM solutions

PART 18: Five forces analysis

PART 19: Vendor landscape

  • Competitive landscape
  • BeyondTrust
  • CA Technologies
  • Centrify Corporation
  • CyberArk
  • IBM
  • ARCON
  • Other prominent vendors

PART 20: Key vendor profiles

  • BeyondTrust
  • CA Technologies
  • Centrify Corporation
  • CyberArk
  • IBM
  • Assumptions

PART 21: Appendix

  • List of abbreviations

PART 22: Explore Technavio

List of Exhibits

  • Exhibit 01: Overview of numbers
  • Exhibit 02: Major countries covered in regions
  • Exhibit 03: Product offerings
  • Exhibit 04: Currency exchange rates considered in report
  • Exhibit 05: PIM functions
  • Exhibit 06: PIM users and tasks
  • Exhibit 07: Types of privileged identity
  • Exhibit 08: Global PIM market 2015-2020 ($ millions)
  • Exhibit 09: PIM market for large enterprises 2015-2020 ($ millions)
  • Exhibit 10: PIM market in government sector 2015-2020 ($ millions)
  • Exhibit 11: PIM market for SMEs 2015-2020 ($ millions)
  • Exhibit 12: Global PIM market by product 2015 (% share)
  • Exhibit 13: Global PIM market by product 2020 (% share)
  • Exhibit 14: Geographical segmentation of global PIM market 2015 (% share)
  • Exhibit 15: Geographical segmentation of global PIM market 2020 (% share)
  • Exhibit 16: PIM market in APAC 2015-2020 ($ millions)
  • Exhibit 17: PIM market in EMEA 2015-2020 ($ millions)
  • Exhibit 18: PIM market in Americas 2015-2020 ($ millions)
  • Exhibit 19: High-profile data breaches
  • Exhibit 20: Impact of drivers
  • Exhibit 21: Impact of drivers and challenges
  • Exhibit 22: Impact of trends
  • Exhibit 23: Buying criteria for PIM solutions
  • Exhibit 24: Five forces analysis
  • Exhibit 25: Vendor matrix: Compliance and audit
  • Exhibit 26: Vendor matrix: Supporting platform
  • Exhibit 27: Vendor matrix: Directories
  • Exhibit 28: Vendor matrix: Access functionality
Back to Top