Cloud Identity and Access Management Software Market - Growth, Trends, and Forecast (2020 - 2025)

出版商 Mordor Intelligence LLP 商品編碼 393686
出版日期 內容資訊 英文 120 Pages
商品交期: 2-3個工作天內
全球雲端IAM(ID與訪問管理)軟體市場:成長,趨勢,及預測 Cloud Identity and Access Management Software Market - Growth, Trends, and Forecast (2020 - 2025)
出版日期: 2020年01月01日內容資訊: 英文 120 Pages



第1章 簡介

  • 調查成果
  • 調查的前提條件
  • 調查範圍

第2章 調查方法

第3章 摘要整理

第4章 市場動態

  • 市場概況
  • 市場成長及阻礙因素概要
  • 市場成長要素
    • 與安全漏洞數量相關的成本增加
    • 企業BYOD的使用增加趨勢
  • 市場阻礙因素
    • 易受網絡風險影響的雲端基礎應用
  • 價值鏈分析
  • 產業的魅力:波特的五力分析

第5章 技術概要

第6章 市場區隔

  • 各組織規模
    • 中·小規模
    • 大規模
  • 各解決方案類別
    • 審核,遵守,管治
    • 單點登錄(SSO)及聯盟供應
    • 特權訪問管理
    • 名錄服務
    • 其他
  • 各部署類型
    • 公共
    • 民間
    • 混合
  • 各終端用戶產業
    • IT·信用
    • BFSI
    • 醫療保健
    • 娛樂·媒體
    • 零售
    • 教育
    • 其他
  • 各地區
    • 北美
    • 歐洲
    • 亞太地區
    • 南美
    • 中東·非洲

第7章 競爭情形

  • 企業簡介
    • Cyberark Software Ltd
    • Broadcom Inc. (CA Technologies)
    • IBM Corporation
    • Microsoft Corporation
    • Oracle Corporation
    • Okta Inc.
    • Centrify Corporation
    • Sailpoint Technologies Holdings Inc.
    • Auth0 Inc.
    • Dell Technologies Inc.

第8章 投資分析

第9章 市場機會及今後趨勢


Product Code: 49600

Market Overview

The cloud identity and access management software market was valued at USD 2925.55 million in 2019, and it is expected to reach a value of USD 8127.70 million by 2025, at a CAGR of 18.77% over the forecast period (2020-2025).

  • Cloud identity and access management (IAM) technology is used to initiate, capture, record, and manage multiple user identities and their access permissions. All users are authenticated, authorized, and evaluated, according to the company policies and their respective roles.
  • Cloud technology is changing the way businesses work, driven by the cost efficiencies and economies of scale. However, lack of proper security measures can undermine the benefits of cloud computing. This calls for a fundamental need for security solutions, including security for identity-related crimes, and hence, drives the market for cloud identity and access management.
  • Among the types of cloud deployment being used in the market, public cloud accounted for the largest market share, owing to their increased adoption across different verticals. However, hybrid cloud deployment is expected to witness the highest CAGR over the forecast period, because of growing adoption among small- and medium-sized enterprises.
  • Increasing penetration of mobiles and tablets has enabled employees to connect to the enterprise network through their mobiles and laptops. Instead of using their old office desktops, employees like to use their own devices in enterprises, which increases the need for cloud identity and access management software, and hence drives the market studied.

Scope of the Report

The cloud identity and access management market includes cloud-based identity and access management solutions, which include the software that are deployed on cloud and used for preventing identity threats in an enterprise. The end-user verticals include IT and telecommunication, healthcare, BFSI, media and entertainment, retail, and education.

Key Market Trends

Single Sign-on (SSO) and Federated Provisioning is Expected to Witness the Highest Growth

  • Single sign-on (SSO) is the most recent innovation in identity access management. The compact and highly flexible nature of this solution is attracting a wide range of end users, ranging from IT companies to the manufacturing sector.
  • In the case of federated provisioning, the solution is a mix of two separate systems called federated identity and provisioning. Federated identity refers to the standards by which identity management responsibilities can be shared between various policy domains, while provisioning is the automation of all the lifecycle steps required to manage user or system access entitlements.
  • The capability of retaining in-house control of user accounts, while leveraging cloud applications and data is the significant advantage that the federated provisioning solutions offer and are driving the immense growth of these solutions in the market.
  • Furthermore, the increasing number of social engineering attacks and identity thefts is driving the growth of both single sign-on and federated provisioning in common, especially in the developed countries of North America and Europe.

North America Occupies the Largest Market Share

  • Most of the cloud advanced organizations in the world are from the North American region, along with the high number of startups (whose most preferred mode of deployment of a solution is cloud).
  • Along with the highest adoption of cloud-based software services, it is also reported by the ITU (International Telecommunication Union) that North American region is very pro-active and committed toward cybersecurity.
  • Moreover, benefits, like reduced CAPEX and faster rollouts of updates, are some of the major reason for the adoption of cloud-based identity management solutions in the North American region.
  • Major adoption of cloud-based IAM in the region is seen in the BFSI sector, and it may continue to rise, as the credit card frauds and breaches accounted for a major share in total number of identity thefts, as reported by the US consumer sentinel network.

Competitive Landscape

The cloud identity and access management market comprises of several global and regional players, a moderately-contested market space. However, the market is shifting toward consolidation of various smaller players. Several market players are gaining sustainable competitive advantage in the market through innovations. Some of the major players in the market are IBM Corporation, Microsoft Corporation, and Oracle Corporation, among others.

  • April 2018 - Cyberark announced that it has enhanced its cloud automation capabilities by incorporating CyberARK AMIs and AWS Cloud formation templates to provide advanced protection, especially in dynamic cloud environments.
  • March 2018 - IBM teamed up with Cloudflare, a billion-dollar tech startup headquartered in San Francisco, to provide a new set of cyber security offerings to its cloud computing customers. The combination of these two giants may simplify things for end users.

Reasons to Purchase this report:

  • The market estimate (ME) sheet in Excel format
  • Report customization as per the client's requirements
  • 3 months of analyst support

Table of Contents


  • 1.1 Study Deliverables
  • 1.2 Study Assumptions
  • 1.3 Scope of the Study




  • 4.1 Market Overview
  • 4.2 Introduction to Market Drivers and Restraints
  • 4.3 Market Drivers
    • 4.3.1 Increasing Number of Security Breaches and Related Costs
    • 4.3.2 Increasing Trend of Using BYODs in Enterprises
  • 4.4 Market Restraints
    • 4.4.1 Vulnerability of Cloud-based Applications to Cyber Risks
  • 4.5 Value Chain Analysis
  • 4.6 Industry Attractiveness - Porter's Five Forces Analysis
    • 4.6.1 Threat of New Entrants
    • 4.6.2 Bargaining Power of Buyers/Consumers
    • 4.6.3 Bargaining Power of Suppliers
    • 4.6.4 Threat of Substitute Products
    • 4.6.5 Intensity of Competitive Rivalry



  • 6.1 By Size of Organization
    • 6.1.1 SMEs
    • 6.1.2 Large Organization
  • 6.2 By Type of Solution
    • 6.2.1 Audit, Compliance, and Governance
    • 6.2.2 Single Sign-on (SSO) and Federated Provisioning
    • 6.2.3 Privileged Access Management
    • 6.2.4 Directory Service
    • 6.2.5 Other Types of Solution
  • 6.3 By Type of Deployment
    • 6.3.1 Public
    • 6.3.2 Private
    • 6.3.3 Hybrid
  • 6.4 By End-user Vertical
    • 6.4.1 IT and Telecommunication
    • 6.4.2 BFSI
    • 6.4.3 Healthcare
    • 6.4.4 Entertainment and Media
    • 6.4.5 Retail
    • 6.4.6 Education
    • 6.4.7 Other End-user Verticals
  • 6.5 Geography
    • 6.5.1 North America
    • 6.5.2 Europe
    • 6.5.3 Asia-Pacific
    • 6.5.4 Latin America
    • 6.5.5 Middle East & Africa


  • 7.1 Company Profiles
    • 7.1.1 Cyberark Software Ltd
    • 7.1.2 Broadcom Inc. (CA Technologies)
    • 7.1.3 IBM Corporation
    • 7.1.4 Microsoft Corporation
    • 7.1.5 Oracle Corporation
    • 7.1.6 Okta Inc.
    • 7.1.7 Centrify Corporation
    • 7.1.8 Sailpoint Technologies Holdings Inc.
    • 7.1.9 Auth0 Inc.
    • 7.1.10 Dell Technologies Inc.