Cover Image
市場調查報告書

行動用戶認證的全球市場預測及分析 2020年

Mobile User Authentication Market by User Type (Small and Medium Enterprises (SME's) and Enterprises), Vertical, and Region (North America, Europe, Asia-Pacific, Middle East and Africa, and Latin America) - Global Forecast and Analysis to 2020

出版商 MarketsandMarkets 商品編碼 342075
出版日期 內容資訊 英文 114 Pages
訂單完成後即時交付
價格
Back to Top
行動用戶認證的全球市場預測及分析 2020年 Mobile User Authentication Market by User Type (Small and Medium Enterprises (SME's) and Enterprises), Vertical, and Region (North America, Europe, Asia-Pacific, Middle East and Africa, and Latin America) - Global Forecast and Analysis to 2020
出版日期: 2015年10月13日 內容資訊: 英文 114 Pages
簡介

終端用戶對於安全方面變得有強烈意識,還有很多軟體供應商在服務內容協定書 (SLA)內包含著安全。可是,推動強力認證需求的是對企業的電腦網路攻擊頻率增加,局內人的資料盜竊和內部告發。

本報告以全球行動用戶認證市場為主題,提供市場概要、市場發展促進與阻礙因素、各用戶類型/各垂直工業/各地區的市場現況與展望相關調查分析、競爭環境、主要企業簡介彙整。

第1章 簡介

第2章 調查手法

第3章 摘要整理

第4章 重要考察

  • 行動用戶認證市場上富有魅力的市場機會
  • 行動用戶認證市場
  • 行動用戶認證市場潛力
  • 行動用戶認證的地區市場
  • 行動用戶認證市場:垂直成長矩陣
  • 生命週期分析:各地區

第5章 市場概要

  • 簡介
    • 用戶類型
    • 垂直產業
    • 地區
  • 市場動態
    • 促進要素
    • 阻礙要素
    • 機會
    • 課題

第6章 產業趨勢

  • 簡介
  • 價值鏈分析
  • 波特的五力分析

第7章 行動用戶認證市場分析

  • 簡介

第8章 行動用戶認證市場分析:各用戶類型

  • 簡介
  • SME (中小企業)
  • 大企業

第9章 行動用戶認證市場分析:各垂直產業

  • 簡介
  • 大學、教育
  • 銀行、金融服務及保險 (BFSI)
  • 消費品、零售
  • 能源、發電
  • 政府、國防
  • 生命科學、醫療
  • IT、通訊
  • 製造
  • 其他

第10章 地區分析

  • 簡介
  • 北美
  • 歐洲
  • 亞太地區
  • 中東、非洲
  • 南美

第11章 競爭情形

  • 概要
  • 競爭情形、趨勢

第12章 企業簡介 (概要、財務、產品 & 服務及發展趨勢)

  • 簡介
  • CA TECHNOLOGIES INC.
  • EMC CORPORATION
  • GEMALTO NV
  • SYMANTEC CORPORATION
  • VASCO DATA SECURITY INTERNATIONAL INC.
  • AUTHENTIFY INC.
  • ENTRUST DATACARD CORPORATION
  • SECUREAUTH CORPORATION
  • SECURENVOY PLC
  • TELESIGN

第13章 主要創新者簡介

  • DEEPNET SECURITY
    • 產業概要
    • 提供解決方案
  • SMS PASSCODE A/S

第14章 附錄

圖表清單

目錄
Product Code: TC 3813

Today, most of enterprises are vying to effectively address the security and the authentication concerns attributed to verify the end-users and legitimize his/her actions. The end-users are becoming highly aware of the security aspect and most of the software providers are incorporating security into their service level agreements. But major boost to the need of strong authentication is attributed to increase in insider data thefts and whistle-blowing as well increased frequency of cyber-attacks on enterprises. It has been observed that most of the attacks on large enterprises have been state-sponsored and are committed to derail the business processes of the enterprises to ultimately cause monetary damage.

Most of enterprises consist of voluminous amount of sensitive organizational data which is being generated on a daily basis. This data may vary from spreadsheets to huge databases and can be highly unstructured. There need to be pre-defined security and access policies to this data to ensure that who access what type of data. At the same time, there an urgent need in managing, protecting and revoking credentials of a private individual. Also, the growth of mobile user authentication is due to the increased need in verifying and validating the end-user based on its behavioral characteristics. The behavioral characteristics such as time of login, pattern of login, geographical co-ordinates and timestamps are being used more frequently to deliver robust authentication solutions. The mobile user authentication market can be defined as the market for the authenticating an end-user using factored authentication in which one of the authentication factor is mobile which is in the possession of the end-user. Mobile user authentication not only provides secured access to the sensitive content but it is also instrumental in framing and enforcing different security and access control policies in any organization. Mobile user authentication is crucial in providing a unified view about enterprise wide-security and introduces greater visibility and transparency in business processes of an organization.

The mobile user authentication market has been segmented on the basis of user types into Small and Medium Enterprises (SMEs) and enterprises; on the basis of verticals types into academia & education, Banking, Financial Services, and Insurance (BFSI), consumer goods & retail, energy & power, government & defense, life sciences & healthcare, manufacturing, IT & telecom, and others; and on the basis of regions into North America, Asia-Pacific (APAC), Europe, the Middle East and Africa (MEA), and Latin America. The report also provides insights into the opportunity analysis of specific verticals and business case analysis and roadmaps for the mobile user authentication market.

There are various assumptions that have been taken into consideration for the market sizing and forecasting exercise. Few global assumptions include political, economic, social, technological, and economic factors. For instance, exchange rates, one of the economic factors, are expected to have a moderate rating of impact on this market. Therefore, dollar fluctuations are expected to not seriously affect the forecasts in the emerging regions.

The report will help the market leaders/new entrants in this market in the following ways:

  • 1. This report segments the market into user types, verticals, and regions covering this market comprehensively. The report provides the closest approximations of the revenue numbers for the overall market. The market numbers are further split across the different verticals and regions.
  • 2. This report will help them better understand the competitors and gain more insights to better position their business. There is a separate section on competitive landscape, including competitor ecosystem, mergers and acquisition, and partnerships and agreements. Besides, there are company profiles of top 10 players in this market along with two key innovators.
  • 3. The report helps them understand the pulse of the market. The report provides information on key market drivers, restraints, challenges, and opportunities.

TABLE OF CONTENTS

1. INTRODUCTION

  • 1.1. OBJECTIVES OF THE STUDY
  • 1.2. MARKET DEFINITION
  • 1.3. MARKET SCOPE
    • 1.3.1. MARKETS COVERED
    • 1.3.2. YEARS CONSIDERED FOR THE STUDY
  • 1.4. LIMITATIONS
  • 1.5. CURRENCY
  • 1.6. STAKEHOLDERS

2. RESEARCH METHODOLOGY

  • 2.1. RESEARCH DATA
    • 2.1.1. SECONDARY DATA
      • 2.1.1.1. Key data from secondary sources
    • 2.1.2. PRIMARY DATA
      • 2.1.2.1. Key data from primary sources
      • 2.1.2.2. Key industry insights
      • 2.1.2.3. Breakdown of primary interviews: by company type, designation, and region
  • 2.2. MARKET SIZE ESTIMATION
    • 2.2.1. BOTTOM-UP APPROACH
    • 2.2.2. TOP-DOWN APPROACH
  • 2.3. MARKET BREAKDOWN AND DATA TRIANGULATION
  • 2.4. RESEARCH ASSUMPTIONS

3. EXECUTIVE SUMMARY

4. PREMIUM INSIGHTS

  • 4.1. ATTRACTIVE MARKET OPPORTUNITIES IN THE MOBILE USER AUTHENTICATION MARKET
  • 4.2. MOBILE USER AUTHENTICATION MARKET
  • 4.3. MOBILE USER AUTHENTICATION MARKET POTENTIAL
  • 4.4. MOBILE USER AUTHENTICATION REGIONAL MARKET
  • 4.5. MOBILE USER AUTHENTICATION MARKET: VERTICAL GROWTH MATRIX
  • 4.6. LIFECYCLE ANALYSIS, BY REGION, 2015

5. MARKET OVERVIEW

  • 5.1. INTRODUCTION
    • 5.1.1. BY USER TYPE
    • 5.1.2. BY VERTICAL
    • 5.1.3. BY REGION
  • 5.2. MARKET DYNAMICS
    • 5.2.1. DRIVERS
      • 5.2.1.1. Growth of online data sharing and BYOD
      • 5.2.1.2. Growth in high profile cyber attacks
      • 5.2.1.3. Increase in regulatory compliances
      • 5.2.1.4. Increased traction for vulnerability assessment and management
    • 5.2.2. RESTRAINTS
      • 5.2.2.1. Existing base of authentication solutions
      • 5.2.2.2. Shadow IT risk
    • 5.2.3. OPPORTUNITIES
      • 5.2.3.1. Growing impetus to Internet of Things (IoT)
      • 5.2.3.2. Demand for Authentication-as-a-Service (AaaS)
    • 5.2.4. CHALLENGES
      • 5.2.4.1. Educating consumers about security and authentication
      • 5.2.4.2. Security issues associated with cloud and mobile technologies

6. INDUSTRY TRENDS

  • 6.1. INTRODUCTION
  • 6.2. MOBILE USER AUTHENTICATION MARKET: VALUE CHAIN ANALYSIS
  • 6.3. PORTER'S FIVE FORCES ANALYSIS
    • 6.3.1. THREAT OF NEW ENTRANTS
    • 6.3.2. THREAT OF SUBSTITUTES
    • 6.3.3. BARGAINING POWER OF SUPPLIERS
    • 6.3.4. BARGAINING POWER OF BUYERS
    • 6.3.5. INTENSITY OF COMPETITIVE RIVALRY

7. MOBILE USER AUTHENTICATION MARKET ANALYSIS

  • 7.1. INTRODUCTION

8. MOBILE USER AUTHENTICATION MARKET ANALYSIS, BY USER TYPE

  • 8.1. INTRODUCTION
  • 8.2. SMES
  • 8.3. ENTERPRISES

9. MOBILE USER AUTHENTICATION MARKET ANALYSIS, BY VERTICAL

  • 9.1. INTRODUCTION
  • 9.2. ACADEMIA AND EDUCATION
  • 9.3. BANKING, FINANCIAL SERVICES AND INSURANCE (BFSI)
  • 9.4. CONSUMER GOODS AND RETAIL
  • 9.5. ENERGY AND POWER
  • 9.6. GOVERNMENT AND DEFENSE
  • 9.7. LIFE SCIENCES AND HEALTHCARE
  • 9.8. IT AND TELECOM
  • 9.9. MANUFACTURING
  • 9.10. OTHERS

10. GEOGRAPHIC ANALYSIS

  • 10.1. INTRODUCTION
  • 10.2. NORTH AMERICA
  • 10.3. EUROPE
  • 10.4. ASIA-PACIFIC
  • 10.5. MIDDLE EAST AND AFRICA
  • 10.6. LATIN AMERICA

11. COMPETITIVE LANDSCAPE

  • 11.1. OVERVIEW
  • 11.2. COMPETITIVE SITUATION AND TRENDS
    • 11.2.1. NEW PRODUCT DEVELOPMENTS
    • 11.2.2. PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS
    • 11.2.3. MERGERS AND ACQUISITIONS
    • 11.2.4. NEW CONTRACTS
    • 11.2.5. DELIVERY MODELS

12. COMPANY PROFILES (Overview, Financials, Products & Services, Strategy, and Developments)*

  • 12.1. INTRODUCTION
  • 12.2. CA TECHNOLOGIES INC.
  • 12.3. EMC CORPORATION
  • 12.4. GEMALTO NV
  • 12.5. SYMANTEC CORPORATION
  • 12.6. VASCO DATA SECURITY INTERNATIONAL INC.
  • 12.7. AUTHENTIFY INC.
  • 12.8. ENTRUST DATACARD CORPORATION
  • 12.9. SECUREAUTH CORPORATION
  • 12.10. SECURENVOY PLC
  • 12.11. TELESIGN

*Details on overview, financials, product & services, strategy, and developments might not be captured in case of unlisted companies.

13. KEY INNOVATOR PROFILES

  • 13.1. DEEPNET SECURITY
    • 13.1.1. BUSINESS OVERVIEW
    • 13.1.2. SOLUTIONS OFFERED
  • 13.2. SMS PASSCODE A/S
    • 13.2.1. BUSINESS OVERVIEW
    • 13.2.2. SOLUTIONS OFFERED

14. APPENDIX

  • 14.1. INDUSTRY EXCERPTS
    • 14.1.1. NEW PRODUCT DEVELOPMENTS, 2013-2015
    • 14.1.2. PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS
    • 14.1.3. NEW CONTRACTS
  • 14.2. DISCUSSION GUIDE
  • 14.3. INTRODUCING RT: REAL-TIME MARKET INTELLIGENCE
  • 14.4. AVAILABLE CUSTOMIZATIONS
  • 14.5. RELATED REPORTS

LIST OF TABLES

  • TABLE 1: MOBILE USER AUTHENTICATION MARKET SIZE AND GROWTH RATE, 2013-2020 (USD MILLION, Y-O-Y %)
  • TABLE 2: MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF DRIVERS
  • TABLE 3: MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF RESTRAINTS
  • TABLE 4: MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF OPPORTUNITIES
  • TABLE 5: MOBILE USER AUTHENTICATION MARKET: ANALYSIS OF CHALLENGES
  • TABLE 6: MOBILE USER AUTHENTICATION MARKET SIZE, 2013-2020 (USD MILLION)
  • TABLE 7: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 8: SMES: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 9: ENTERPRISES: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 10: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013-2020 (USD MILLION)
  • TABLE 11: ACADEMIA AND EDUCATION: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 12: ACADEMIA AND EDUCATION: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 13: BFSI: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 14: BFSI: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 15: CONSUMER GOODS AND RETAIL: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 16: CONSUMER GOODS AND RETAIL: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 17: ENERGY AND POWER: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 18: ENERGY AND POWER: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 19: GOVERNMENT AND DEFENSE: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 20: GOVERNMENT AND DEFENSE: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 21: LIFE SCIENCES AND HEALTHCARE: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 22: LIFE SCIENCES AND HEALTHCARE: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 23: IT AND TELECOM: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 24: IT AND TELECOM: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 25: MANUFACTURING: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 26: MANUFACTURING: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 27: OTHERS: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 28: OTHERS: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 29: MOBILE USER AUTHENTICATION MARKET SIZE, BY REGION, 2013-2020 (USD MILLION)
  • TABLE 30: NORTH AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013-2020 (USD MILLION)
  • TABLE 31: NORTH AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 32: EUROPE: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013-2020 (USD MILLION)
  • TABLE 33: EUROPE: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 34: ASIA-PACIFIC: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013-2020 (USD MILLION)
  • TABLE 35: ASIA-PACIFIC: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 36: MIDDLE EAST AND AFRICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013-2020 (USD MILLION)
  • TABLE 37: MIDDLE EAST AND AFRICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 38: LATIN AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY VERTICAL, 2013-2020 (USD MILLION)
  • TABLE 39: LATIN AMERICA: MOBILE USER AUTHENTICATION MARKET SIZE, BY USER TYPE, 2013-2020 (USD MILLION)
  • TABLE 40: NEW PRODUCT DEVELOPMENTS, 2013-2015
  • TABLE 41: PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS, 2013-2015
  • TABLE 42: MERGERS AND ACQUISITIONS, 2013-2015
  • TABLE 43: NEW CONTRACTS, 2013-2015
  • TABLE 44: PARTNERSHIPS, AGREEMENTS AND COLLABORATIONS, 2013-2015
  • TABLE 45: NEW CONTRACTS, 2013-2015

LIST OF FIGURES

  • FIGURE 1: RESEARCH DESIGN
  • FIGURE 2: MARKET SIZE ESTIMATION METHODOLOGY: BOTTOM-UP APPROACH
  • FIGURE 3: MARKET SIZE ESTIMATION METHODOLOGY: TOP-DOWN APPROACH
  • FIGURE 4: DATA TRIANGULATION
  • FIGURE 5: MOBILE USER AUTHENTICATION MARKET SIZE, USER TYPE SNAPSHOT (2015-2020): SME MARKET IS EXPECTED TO QUADRUPLE BY 2020
  • FIGURE 6: MOBILE USER AUTHENTICATION MARKET SHARE: NORTH AMERICA IS EXPECTED TO HOLD THE LARGEST MARKET SHARE IN 2015
  • FIGURE 7: GROWTH IN ONLINE DATA SHARING AND INCREASED ADOPTION OF BYOD IS DRIVING THE MOBILE USER AUTHENTICATION MARKET
  • FIGURE 8: NORTH AMERICA IS EXPECTED TO EXHIBIT THE HIGHEST MARKET SHARE IN THE MOBILE USER AUTHENTICATION MARKET (2015)
  • FIGURE 9: ASIA-PACIFIC AND MIDDLE EAST & AFRICA ARE EXPECTED TO HAVE THE HIGHEST MARKET GROWTH POTENTIAL DURING THE FORECAST PERIOD
  • FIGURE 10: ASIA-PACIFIC IS EXPECTED TO GROW WITH HIGHER CAGR THAN MIDDLE EAST & AFRICA AND LATIN AMERICA
  • FIGURE 11: MOBILE USER AUTHENTICATION VERTICAL GROWTH MATRIX
  • FIGURE 12: REGIONAL LIFECYCLE: ASIA-PACIFIC IS IN THE GROWTH PHASE IN 2015
  • FIGURE 13: MOBILE USER AUTHENTICATION MARKET SEGMENTATION: BY USER TYPE
  • FIGURE 14: MOBILE USER AUTHENTICATION MARKET SEGMENTATION: BY VERTICAL
  • FIGURE 15: MOBILE USER AUTHENTICATION MARKET SEGMENTATION: BY REGION
  • FIGURE 16: MOBILE USER AUTHENTICATION: DRIVERS, RESTRAINTS, OPPORTUNITIES, AND CHALLENGES
  • FIGURE 17: VALUE CHAIN ANALYSIS
  • FIGURE 18: PORTER'S FIVE FORCES ANALYSIS: MOBILE USER AUTHENTICATION MARKET
  • FIGURE 19: SMES WILL EXHIBIT HIGHER GROWTH RATE IN THE MOBILE USER AUTHENTICATION MARKET DURING THE FORECAST PERIOD
  • FIGURE 20: GOVERNMENT AND DEFENSE VERTICAL IS EXPECTED TO HAVE THE LARGEST MARKET SIZE IN THE MOBILE USER AUTHENTICATION MARKET BY 2020
  • FIGURE 21: NORTH AMERICA WILL CONTINUE TO HAVE THE LARGEST MARKET SIZE IN THE MOBILE USER AUTHENTICATION MARKET DURING THE FORECAST PERIOD 2015-2020
  • FIGURE 22: GEOGRAPHIC SNAPSHOT: ASIA-PACIFIC IS EMERGING AS A NEW HOTSPOT IN THE MOBILE USER AUTHENTICATION MARKET
  • FIGURE 23: ASIA-PACIFIC IS THE FASTEST GROWING MARKET IN THE MOBILE USER AUTHENTICATION MARKET
  • FIGURE 24: NORTH AMERICA MARKET SNAPSHOT: INCREASED TRACTION AMONG VERTICALS WILL DRIVE THE MARKET
  • FIGURE 25: ASIA-PACIFIC MARKET SNAPSHOT: INCREASED TRACTION AMONG GROWING ECONOMIES WILL DRIVE THE MARKET
  • FIGURE 26: COMPANIES ADOPTED, ACQUISITIONS, NEW PRODUCT DEVELOPMENTS, AND PARTNERSHIP AGREEMENTS AND COLLABORATIONS AS THE KEY GROWTH STRATEGIES FOR THE -PERIOD 2013-2015
  • FIGURE 27: MARKET EVALUATION FRAMEWORK
  • FIGURE 28: BATTLE FOR MARKET SHARE: NEW PRODUCT LAUNCHES WAS THE KEY STRATEGY ADOPTED BY PLAYERS DURING THE LAST 3 YEARS
  • FIGURE 29: GEOGRAPHIC REVENUE MIX OF TOP FIVE PLAYERS
  • FIGURE 30: CA TECHNOLOGIES INC.: COMPANY SNAPSHOT
  • FIGURE 31: CA TECHNOLOGIES INC.: SWOT ANALYSIS
  • FIGURE 32: EMC CORPORATION: COMPANY SNAPSHOT
  • FIGURE 33: EMC CORPORATION: SWOT ANALYSIS
  • FIGURE 34: GEMALTO NV: COMPANY SNAPSHOT
  • FIGURE 35: GEMALTO NV: SWOT ANALYSIS
  • FIGURE 36: SYMANTEC CORPORATION: COMPANY SNAPSHOT
  • FIGURE 37: SYMANTEC CORPORATION: SWOT ANALYSIS
  • FIGURE 38: VASCO DATA SECURITY INTERNATIONAL INC.: COMPANY SNAPSHOT
  • FIGURE 39: VASCO DATA SECURITY INTERNATIONAL, INC: SWOT ANALYSIS
Back to Top