Cover Image
市場調查報告書

個人信息管理的全球市場 (2016∼2020年)

Global Personal Identity management 2016-2020

出版商 TechNavio (Infiniti Research Ltd.) 商品編碼 351664
出版日期 內容資訊 英文 44 Pages
訂單完成後即時交付
價格
Back to Top
個人信息管理的全球市場 (2016∼2020年) Global Personal Identity management 2016-2020
出版日期: 2016年01月27日 內容資訊: 英文 44 Pages
簡介

行動終端的利用在企業和消費者等之間,作為網站瀏覽和電子郵件、社群網路、應用程式的下載、消費等終端而急速擴展。因此,行動終端的安全對消費者個人和企業來說是重要事項,導致個人信息管理解決方案的引進擴大。個人信息管理,廣泛守護行動終端不會受到惡意程式和資料盜竊、不正當訪問、病毒、間諜軟體、駭侵、詐騙,及意外損失等。

本報告提供個人信息管理的全球市場的目前方案和成長的展望,以專家意見為基礎的市場分析,主要供應商分析等。

第1章 摘要整理

第2章 調查的對象

  • 頂級供應商的提供產品

第3章 市場調查手法

  • 調查手法
  • 經濟指標

第4章 簡介

  • 主要市場焦點

第5章 市場概要

  • 個人資料的種類
  • 個人信息相關的威脅
  • 個人信息管理解決方案的優點

第6章 市場展望

第7章 技術生命週期分析

  • 個人信息管理的全球市場

第8章 各應用領域市場分類

  • 各應用領域的個人信息管理的全球市場
  • 各出入控管的個人信息管理的全球市場
  • 各內容管理的個人信息管理的全球市場

第9章 地區分類

  • 各地區的個人信息管理的全球市場

第10章 購買標準

  • 個人信息管理解決方案的購買標準

第11章 市場促進要素

  • 行動終端的利用擴大
  • 高簡介資料的破壞
  • 網際網路的依賴
  • 保護品質改善的需求

第12章 促進要素與其影響

第13章 市場課題

  • 充分的安全解決方案的不足
  • 複雜的IT基礎設施
  • 電腦網路對行動數據的攻擊
  • 實行相關的高成本

第14章 促進要素的影響與課題

第15章 市場趨勢

  • DDoS型攻擊的增加
  • 雲端型解決方案的需求
  • 更佳保護的需求
  • 從個人信息管理轉移到個人的存取保護

第16章 波特的五力分析

第17章 供應商分析

  • 競爭方案
  • 產品的特長
  • 主要供應商概要
  • 供應商的焦點
  • 其他重要供應商

第18章 附屬資料

第19章 關於Technavio

目錄
Product Code: IRTNTR8286

About Personal Identity Management

Mobile devices are increasingly being used by enterprises and consumers alike. These are becoming the preferred devices for web browsing, e-mailing, social networking, application downloads, and transations. Therefore, the security of mobile devices is becoming a priority for individual consumers and enterprises alike, leading to an increased adoption of personal identity management solutions. Personal identity management broadly encompasses the protection of mobile devices from malware, data theft, unauthorized access, viruses, spyware, hackers, online identity theft, and accidental loss.

The consequences of malicious identities gaining access to personal information can be disastrous and irreparable. Personal identity management is a security solution that ensures the accessibility of resources to authorized individuals in a multi-technology environment. Personal identity management solutions provide secure identity-based access to mobile applications and information from any location. These solutions help enterprises secure application systems by permitting employee access with a single sign-on (SSO) password.

Technavio's analysts forecast the global personal identity management market to grow at a CAGR of 33.34% during the period 2016-2020.

Covered in this report

The report covers the present scenario and the growth prospects of the global personal identity management market for 2016-2020. To calculate the market size, the report considers the revenue generated from the sales of personal identity management software, which includes mobile identity and content management software. It is used in mobile devices such as smartphones, tablets, and laptops to implement bring-your-own-device (BYOD) security.

The market is divided into the following segments based on application:

  • Access control
  • Content management

Technavio's report, Global Personal Identity Management Market 2016-2020, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects over the coming years. The report also includes a discussion of the key vendors operating in this market.

Key vendors

  • Citrix Systems
  • Good Technology
  • IBM
  • MobileIron
  • Vmware

Other Prominent Vendors

  • Alfresco Software
  • CA Technologies
  • Colligo Networks
  • SAP
  • Sophos
  • SOTI
  • Symantec
  • Centrify
  • Fischer International
  • Okta
  • OneLogin

Market driver

  • Increased use of mobile devices
  • For a full, detailed list, view our report

Market challenge

  • Lack of efficient security solutions
  • For a full, detailed list, view our report

Market trend

  • Increased number of distributed denial of service (DDoS) attacks
  • For a full, detailed list, view our report

Key questions answered in this report

  • What will the market size be in 2020 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

You can request one free hour of our analyst's time when you purchase this market report. Details are provided within the report.

Table of Contents

PART 01: Executive summary

  • Market insights

PART 02: Scope of the report

  • Top-vendor offerings

PART 03: Market research methodology

  • Research methodology
  • Economic indicators

PART 04: Introduction

  • Key market highlights

PART 05: Market description

  • Types of personal data
  • Identity-related threats
  • Advantages of personal identity management solutions

PART 06: Market landscape

PART 07: Technology life cycle analysis

  • Global personal identity management market

PART 08: Market segmentation by application

  • Global personal identity management market by application
  • Global personal identity management market by access control
  • Global personal identity management market by content management

PART 09: Geographical segmentation

  • Global personal identity management market by region

PART 10: Buying criteria

  • Buying criteria for personal identity management solutions

PART 11: Market drivers

  • Increased use of mobile devices
  • High-profile data breaches
  • Dependency on the Internet
  • Need to improve quality of protection

PART 12: Impact of drivers

PART 13: Market challenges

  • Lack of efficient security solutions
  • Complex IT infrastructure
  • Cyber-attacks on mobile data
  • High cost of implementation

PART 14: Impact of drivers and challenges

PART 15: Market trends

  • Increased number of DDoS attacks
  • Demand for cloud-based solutions
  • Need for better protection
  • Shift from identity management to identity access security

PART 16: Five forces model

PART 17: Vendor analysis

  • Competitive scenario
  • Product features
  • Description of leading vendors
  • Vendor highlights
  • Other prominent vendors

PART 18: Appendix

  • List of abbreviations

PART 19: Explore Technavio

List of Exhibits

  • Exhibit 01: Product offerings
  • Exhibit 02: Types of personal data
  • Exhibit 03: Types of identity-related threats
  • Exhibit 04: Overview of global personal identity management market
  • Exhibit 05: Life cycle of personal identity management
  • Exhibit 06: Global personal identity management market 2015-2020 ($ billions)
  • Exhibit 07: Global personal identity management market by application 2015-2020
  • Exhibit 08: Global personal identity management market by access control 2015-2020 ($ billions)
  • Exhibit 09: Global personal identity management market by content management 2015-2020 ($ billions)
  • Exhibit 10: Global personal identity management market by region 2015-2020
  • Exhibit 11: Global personal identity management market by region 2015-2020 ($ millions)
  • Exhibit 12: Buying criteria for personal identity management solutions
  • Exhibit 13: Recent high-profile data breaches
  • Exhibit 14: Impact of drivers
  • Exhibit 15: Impact of drivers and challenges
  • Exhibit 16: Five forces model
  • Exhibit 17: Features of key vendor offerings
  • Exhibit 18: Recent M&A
Back to Top