表紙
市場調查報告書

身份識別與存取管理 (IAM:Identity and Access Management)的全球市場分析、預測:∼2022年

Global Identity and Access Management (IAM) Market Analysis, Forecast to 2022

出版商 Frost & Sullivan 商品編碼 783279
出版日期 內容資訊 英文 91 Pages
商品交期: 最快1-2個工作天內
價格
身份識別與存取管理 (IAM:Identity and Access Management)的全球市場分析、預測:∼2022年 Global Identity and Access Management (IAM) Market Analysis, Forecast to 2022
出版日期: 2019年01月23日內容資訊: 英文 91 Pages
簡介

在駭客先進、更具攻擊性的網路、系統、用戶威脅擴大之下,IAM供應商以創新且更整合化的解決方案致力處理這個問題。過去數年這些威脅的公共性推動企業引進IAM。

本報告提供全球身份識別與存取管理 (IAM:Identity and Access Management)的市場調查,市場及技術、解決方案概要,市場成長的各種影響因素分析,各地區、企業規模的收益規模的變化與預測,競爭環境與市場佔有率,主要供應商的簡介,成長機會、成功策略分析等資料彙整。

第1章 摘要整理

第2章 市場概要

第3章 外部的課題:推動因素與阻礙

第4章 市場預測、市場趨勢:整體市場

  • 預測前提條件
  • 市場趨勢、收益預測
  • 全球收益預測相關討論

第5章 市場預測、市場趨勢:各地區、產業

  • 收益預測:各地區
  • 各地區收益預測相關討論
  • 收益預測:各產業
  • 各產業收益預測相關討論

第6章 市場佔有率、競爭分析

  • 市場佔有率、競爭分析
  • 競爭因素、分析
  • 競爭環境

第7章 市場分析、預測:各企業規模

  • 收益預測
  • 企業、大規模企業:主要調查結果
  • 企業、大規模企業相關討論
  • 大規模企業:主要調查結果
  • 大規模企業相關討論
  • 中規模企業:主要調查結果
  • 中規模企業相關討論
  • 小規模/ROBO經營者:主要調查結果
  • 小規模/ROBO經營者相關討論

第8章 總論

  • 總論:預測
  • 總論:建議
  • 免責聲明

第9章 業者簡介

  • Auth0
  • Beta Systems
  • Gemalto
  • Hitachi ID
  • IBM Security
  • Idaptive
  • Identity Automation
  • Microsoft
  • Okta
  • One Identity

第10章 附錄

目錄
Product Code: K305-74

Enabling Productivity, Securing Infrastructure and Protecting Users

The Frost & Sullivan report analyzes the global market for Identity and Access Management (IAM). The IAM market has evolved from a focus on access control and identity management to include governance and analytics. Another key component of IAM is Multifactor Authentication (MFA). IAM has grown more essential as mobility has broken down the physical perimeter that once protected corporate information and productivity systems. Enterprises must secure remote access to their systems while not adversely affecting the productivity of employees and partners working through these systems with cumbersome access and security processes. Industrial IoT is also becoming a more interconnected environment that requires stronger and more flexible IAM oversight.

As the threats to networks, systems, and users themselves grow by leaps and bounds through the actions of more sophisticated and aggressive hackers, IAM suppliers are responding to the challenge with innovative and more integrated solutions. The public nature of the threat over the last several years is driving enterprises to the IAM market. This analysis measures the size of the IAM market in revenue as well as the market share of market leaders. It also delineates the revenue generated by different regions and by individual industry verticals. Data on the revenue generated by various business tiers from small businesses to large enterprises is also provided. The adoption of cloud services has somewhat surprisingly had the biggest impact so far on large businesses rather than the small and medium-sized businesses it was expected to attract to the IAM market. Using cloud-based solutions, large businesses are able to more easily embrace a hybrid model that better supports both on-premises and cloud environments. The growth of small and medium-sized businesses will accelerate over the next three years.

Market drivers and market restraints are identified and explained, and their impact on the growth of the market is examined. IAM is at the heart of a security solution and core robust security is a primary driver. However, the IAM market is driven by two strong and independent elements. Following security, productivity of enterprise employees is the other key driver. Enterprises do not want to inhibit access to core business systems to be the price they pay for implementing more robust security. IAM that can improve both security and productivity has strong winds behind it in terms of growing demand. Governance is also a key driver of IAM as new regulations across the globe, especially in the EU, are making it painful for companies that fall short on compliance. For these reasons, Frost & Sullivan forecasts strong double-digit growth over the course of this study. However, given the weariness that massive digital transformation has left enterprises with, IAM suppliers must be cognizant of adding to the overload and make adoption as seamless and painless as possible.

Table of Contents

1. EXECUTIVE SUMMARY

  • Executive Summary
  • Executive Summary-Market Engineering Measurements
  • Executive Summary-CEO's Perspective
  • Executive Summary-Key Questions This Study Will Answer
  • Introduction to the Research

2. MARKET OVERVIEW

  • Definitions
  • Definitions (continued)
  • Definitions (continued)
  • Definitions (continued)
  • Market Overview
  • Market Overview-Scope
  • Market Overview-Distribution Channels
  • Market Overview-Distribution Channel Discussion

3. EXTERNAL CHALLENGES-DRIVERS AND RESTRAINTS: TOTAL MARKET

  • Drivers and Restraints
  • Drivers Explained
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Drivers Explained (continued)
  • Restraints Explained
  • Restraints Explained (continued)

4. FORECASTS AND TRENDS-TOTAL MARKET

  • Forecast Assumptions
  • Market Trends and Revenue Forecast
  • Global Revenue Forecast Discussion

5. FORECASTS AND TRENDS-REGIONAL AND VERTICAL MARKETS

  • Identity & Access Management Revenue Forecast by Region
  • Regional Revenue Forecast Discussion
  • Identity & Access Management Revenue Forecast by Vertical Market
  • Vertical Market Revenue Forecast Discussion

6. MARKET SHARE AND COMPETITIVE ANALYSIS- TOTAL MARKET

  • Market Share and Competitive Analysis
  • Competitive Factors and Assessment
  • Competitive Environment

7. MARKET SEGMENTATION BY SIZE OF BUSINESS

  • Identity and Access Revenue Forecast Business Tiers
  • Enterprise and Large Enterprise Segment Key Findings
  • Enterprise and Large Enterprise Discussion
  • Large Business Segment Key Findings
  • Large Business Discussion
  • Midsized Business Segment Key Findings
  • Midsized Business Discussion
  • Small/ROBO Segment Key Findings
  • Small/ROBO Business Discussion

8. THE LAST WORD

  • The Last Word-Predictions
  • The Last Word-Recommendations
  • Legal Disclaimer

9. VENDOR PROFILES

  • Vendor Profile-Auth0
  • Vendor Profile-Auth0 (continued)
  • Vendor Profile-Auth0 (continued)
  • Vendor Profile-Beta Systems
  • Vendor Profile-Beta Systems (continued)
  • Vendor Profile-Beta Systems (continued)
  • Vendor Profile-Gemalto
  • Vendor Profile-Gemalto (continued)
  • Vendor Profile-Gemalto (continued)
  • Vendor Profile-Hitachi ID
  • Vendor Profile-Hitachi ID (continued)
  • Vendor Profile-Hitachi ID (continued)
  • Vendor Profile-IBM Security
  • Vendor Profile-IBM Security (continued)
  • Vendor Profile-IBM Security (continued)
  • Vendor Profile-Idaptive
  • Vendor Profile-Idaptive (continued)
  • Vendor Profile-Idaptive (continued)
  • Vendor Profile-Identity Automation
  • Vendor Profile-Identity Automation (continued)
  • Vendor Profile-Identity Automation (continued)
  • Vendor Profile-Microsoft
  • Vendor Profile-Microsoft (continued)
  • Vendor Profile-Microsoft (continued)
  • Vendor Profile-Okta
  • Vendor Profile-Okta (continued)
  • Vendor Profile-Okta (continued)
  • Vendor Profile-One Identity
  • Vendor Profile-One Identity (continued)
  • Vendor Profile-One Identity (continued)

10. APPENDIX

  • Market Engineering Methodology
  • Partial List of Companies Interviewed
  • List of Companies Included in “Others”
  • List of Exhibits